Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 5830-1] smarty4 security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 5830-1] smarty4 security update


Chronologisch Thread  
  • From: Moritz Muehlenhoff <jmm AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 5830-1] smarty4 security update
  • Date: Thu, 12 Dec 2024 19:37:26 +0000
  • Authentication-results: lists.piratenpartei.de; dkim=none; spf=none (lists.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
  • List-archive: https://lists.debian.org/msgid-search/Z1s7dvNMRwK4hD4k AT seger.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=ZjMF557MxNZR1+Fadiu6zQzgJ0XyzWFwd6uHnZzr9DQ=; b=Ni E3rcdluLUNUusL1MAx7wPHS/OvcO6t+AF8adXOI8OciJLXlYUgCBX180w9ufq1ZCoMb65tUee/ZhY hgHcL32v89Ga0ISZD8g6OIf96yaFYncQezHG8ugsKIY5snPrixTOBZQJ3jdmZ0YzTzL1PGTpe+xgb a2G2tEb2tUt5VyNOwJk155ov21TZt/RoNYN5e3aY2rUPLks4AZoqTGdAiFVwwtLf2a/3P1ExzWrus JK/AuovqaMhCj0UZGgCrV9eQCAjBwtMVC03ywhnzH1PXs2DDCDr12VNPWaYjNrzIF7UIz8EncbO2K /9Z7ws1YWMzaDsmUAQAmhByMUbK78BvQ==;
  • Old-return-path: <jmm AT seger.debian.org>
  • Priority: urgent
  • Resent-date: Thu, 12 Dec 2024 19:37:46 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <8FkfEGnC9FC.A.kVDE.KuzWnB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5830-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 12, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : smarty4
CVE ID : CVE-2024-35226

A security vulnerability was discovered in Smarty, a template engine for
PHP, which could result in PHP code injection.

For the stable distribution (bookworm), this problem has been fixed in
version 4.3.0-1+deb12u2.

We recommend that you upgrade your smarty4 packages.

For the detailed security status of smarty4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty4

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=WHiV
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 5830-1] smarty4 security update, Moritz Muehlenhoff, 12.12.2024

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang