Manchester City midfielder Phil Foden will be out of action for three to four weeks more, ruling him out of the start of the Premier League season, he said on Wednesday.
The 21-year-old England international missed last month's European Championship final defeat by Italy on penalties and has been absent from City's pre-season training due to his foot injury.
"It [the foot] is still a little bit sore, it's such a shame to do it just before the Euro final, it was really unfortunate but I'm working hard in the gym," Foden told Sky Sports. "Hopefully, I can get back as soon as possible.
"I'd say around three to four weeks more. Hopefully, it flies by and I can just get back out on the pitch."
Champions Manchester City kick off the season at Tottenham on Sunday and Foden also looks likely to miss the games at promoted Norwich City and Arsenal.
England have World Cup qualifiers against Hungary, Andorra and Poland in early September.
City's first league match after the international break is at Leicester City, who beat them in the Community Shield, on September 11.
City playmaker Kevin De Bruyne is also set to miss the start of the Premier League season with the ankle problem he sustained on international duty with Belgium in the summer.
Who's who in Yemen conflict
Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government
Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council
Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south
Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.
Indika
%3Cp%3E%3Cstrong%3EDeveloper%3A%3C%2Fstrong%3E%2011%20Bit%20Studios%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Odd%20Meter%3Cbr%3E%3Cstrong%3EConsole%3A%3C%2Fstrong%3E%20PlayStation%205%2C%20PC%20and%20Xbox%20series%20X%2FS%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%204%2F5%3C%2Fp%3E%0A