-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5830-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 12, 2024
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : smarty4
CVE ID : CVE-2024-35226
A security vulnerability was discovered in Smarty, a template engine for
PHP, which could result in PHP code injection.
For the stable distribution (bookworm), this problem has been fixed in
version 4.3.0-1+deb12u2.
We recommend that you upgrade your smarty4 packages.
For the detailed security status of smarty4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty4
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmdbOaMACgkQEMKTtsN8 TjaL2g//V6UVdtLCmLQdphWYtANrMpdn8b/w6s5+C9zzxXruO8nj/DOpJYh5gbFb 9Qy27DG3pAz7DFVRn3PJo/0qp9FTp2uKZWgXPjr2iqnzt+ClcSbbL2HzY270g9S5 WVhqlmv7bEFM3+UNF6dsykWcz44EShYq4aITgXItIBgI0LuaYC3krbf9tQsfhNF4 TRslBiifvu3NfeiiVq6NLqdcnegIyJC+nvjycnyeL6t70ua2nlnM/uk3im1ql0rK JiCaeaqzjPANO0h0lJLEnpGjqNPqqN6T3HYosI+YdzB8jJ39vL24iA6k+oJ7Z37w yE3l9TRZC9Q673EEiWLBCaJ19HGY82g1UpRQ85RWPL1Kyqrh+G6ktfMvpAApnFru avLzeivIrawMVX9LHz/aho9BjgAxGlUuWlUH1E0TMEDAsyr4YdkcbY7ccf1zqVLH wK+77xL8OUlc8WfaiNIY8sn79RavB4Ri3pQJxoyTDO7xli7c8K4az38HaU48d4G+ pgvvJq1ZHSxcDnW4xLvEjlFy62OYu8wHR3qeEWeIfL/caZzKPOTXqvZbpHYmMVw8 vNGiVsQyBl0s65ao/dQ19eYvhBYZvVFKbSxnPidiczvm4QRBO4H+HodzPIxG60Ib URUQoaVl7yQ7DbcQL/6k/oklDzlNvhtWsd31b8CvC3v75fqS15A=
=WHiV
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)