-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5826-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 10, 2024
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : smarty3
CVE ID : CVE-2023-28447 CVE-2024-35226
Two security vulnerabilities were discovered in Smarty, a template
engine for PHP, which could result in PHP code injection or cross-site scripting.
For the stable distribution (bookworm), these problems have been fixed in version 3.1.47-2+deb12u1.
We recommend that you upgrade your smarty3 packages.
For the detailed security status of smarty3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmdYjokACgkQEMKTtsN8 Tja+8xAAtUD5uI6fs0rItIZSp/vLL+637EIxY+Z53fm3eIBtF5MeBBFphnJ+aIGL Kfe7B1Ljbjhi+GenuLi3pfcoqJH/PRllVP24wbLjZNuyLdDW6QbG9wo5jewofB3U A+l30v1QzWT6oI2I2VspMNOznc0f1sxhiBAFlInyuZNErK38uIJX+CF3qxiiXJaJ YgGYwRyVPuG5k7rkLSMRrvK2TVsADIgbZ/yldNur541tHEt5mD+zNUOvW1Euw4ug Zc9+vsuVVJJ/QiBLgz/hbK6zZNP2vAhkdiNkAGST9PPR9OrehTQawGfA3O4r2fOX z+XPw/pAQbcK11AAKIC4bggHXPlZuH9OLAM/3SSen3WxDIT+lVnIZoZuut3bpXIE LUdOeHDmqz1wspW7vk+gEOxIPhUJF3L8q03b4jPatCBjp+zjxTnKnDEvgZganHam fiGJtQiSOjmiQhe78ubKs93oc5jNaGG5pyKLbS4WdqU7x1emWAHQx7vHjXXjYARl PhqlRuSwqagaXZ9mqn46vQ+uoIizEBVHpP6BlOyEBsXoI471NE/kOVW+yjdx9p2m ezgcsR/rbl6UZ1JX2GhW37eA4QOrl5EfZfuLcPWIAqGaqFCA+NspsTEaKG+RRL9i 4ppDPvToanxt6cxLddjmX+Uiohygf5tZmz9m7YCgTXaBjvZ5pgU=
=k08f
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)