Author: Pere Orga (pereorga)
Committer: GitHub (web-flow)
Pusher: saundefined
Date: 2024-05-07T15:12:24+03:00

Commit: 
https://github.com/php/web-php/commit/ea892a4b3dabcc32b0362f1bf5a07ee7d86157c5
Raw diff: 
https://github.com/php/web-php/commit/ea892a4b3dabcc32b0362f1bf5a07ee7d86157c5.diff

2024-04-24-1 entry: remove duplicated paragraph and add minor improvements 
(#986)

Changed paths:
  M  archive/entries/2024-04-24-1.xml


Diff:

diff --git a/archive/entries/2024-04-24-1.xml b/archive/entries/2024-04-24-1.xml
index 37b4c41920..78e5c85603 100644
--- a/archive/entries/2024-04-24-1.xml
+++ b/archive/entries/2024-04-24-1.xml
@@ -37,9 +37,9 @@
      </p>
 
      <ul>
-      <li>Glibc security updates from the distribution have been installed</li>
-      <li>Or the iconv extension is not loaded</li>
-      <li>Or the vulnerable character set has been removed from 
gconv-modules-extra.conf</li>
+      <li>Glibc security updates from the distribution have been 
installed.</li>
+      <li>Or the iconv extension is not loaded.</li>
+      <li>Or the vulnerable character set has been removed from 
gconv-modules-extra.conf.</li>
       <li>Or the application passes only specifically allowed character sets 
to iconv.</li>
      </ul>
 
@@ -76,14 +76,9 @@
         the problematic character set from glibc. Perform this procedure for 
every
         gconv-modules-extra.conf file that is available on your system.</p>
 
-        <p>Once an update is available in glibc, updating that package on your
-        Linux machine will be enough to alleviate the issue. You do not need to
-        update PHP, as glibc is a dynamically linked library.</p>
-
         <p>PHP users on Windows are not affected.</p>
 
-        <p>There will therefore also not be a new version of PHP for this
-        vulnerability.</p>
+        <p>Therefore, a new version of PHP will not be released for this 
vulnerability.</p>
     </div>
   </content>
 </entry>

Reply via email to