Author: Gina Peter Banyard (Girgias) Date: 2024-04-24T22:34:52+01:00 Commit: https://github.com/php/web-php/commit/9d503856dcee89a581f3163285dc4f8f27671b33 Raw diff: https://github.com/php/web-php/commit/9d503856dcee89a581f3163285dc4f8f27671b33.diff
Add missing words + markup again Changed paths: M archive/entries/2024-04-24-1.xml Diff: diff --git a/archive/entries/2024-04-24-1.xml b/archive/entries/2024-04-24-1.xml index a378b76602..94ec2e1dc8 100644 --- a/archive/entries/2024-04-24-1.xml +++ b/archive/entries/2024-04-24-1.xml @@ -11,8 +11,9 @@ <div xmlns="http://www.w3.org/1999/xhtml"> <p>Recently, a bug in <strong>glibc</strong> version 2.39 and older (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961</a>) was uncovered - where a buffer overflow in character set conversions *to* the - ISO-2022-CN-EXT character set.</p> + where a buffer overflow in character set conversions <strong>to</strong> + the ISO-2022-CN-EXT character set can result in remote code execution. + </p> <p>This specific buffer overflow in glibc is exploitable through PHP, which uses the iconv functionality in glibc to do character set @@ -22,7 +23,7 @@ <p>There are numerous reports online with titles like "Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)" or "PHP Under Attack". These - titles are misleading as this is <em>not</em> a bug in PHP itself.</p> + titles are misleading as this is <strong>not</strong> a bug in PHP itself.</p> <p>Currently there is no fix for this issue, but there is a workaround described in <a