-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5826-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 10, 2024 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : smarty3 CVE ID : CVE-2023-28447 CVE-2024-35226 Two security vulnerabilities were discovered in Smarty, a template engine for PHP, which could result in PHP code injection or cross-site scripting. For the stable distribution (bookworm), these problems have been fixed in version 3.1.47-2+deb12u1. We recommend that you upgrade your smarty3 packages. For the detailed security status of smarty3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/smarty3 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmdYjokACgkQEMKTtsN8 Tja+8xAAtUD5uI6fs0rItIZSp/vLL+637EIxY+Z53fm3eIBtF5MeBBFphnJ+aIGL Kfe7B1Ljbjhi+GenuLi3pfcoqJH/PRllVP24wbLjZNuyLdDW6QbG9wo5jewofB3U A+l30v1QzWT6oI2I2VspMNOznc0f1sxhiBAFlInyuZNErK38uIJX+CF3qxiiXJaJ YgGYwRyVPuG5k7rkLSMRrvK2TVsADIgbZ/yldNur541tHEt5mD+zNUOvW1Euw4ug Zc9+vsuVVJJ/QiBLgz/hbK6zZNP2vAhkdiNkAGST9PPR9OrehTQawGfA3O4r2fOX z+XPw/pAQbcK11AAKIC4bggHXPlZuH9OLAM/3SSen3WxDIT+lVnIZoZuut3bpXIE LUdOeHDmqz1wspW7vk+gEOxIPhUJF3L8q03b4jPatCBjp+zjxTnKnDEvgZganHam fiGJtQiSOjmiQhe78ubKs93oc5jNaGG5pyKLbS4WdqU7x1emWAHQx7vHjXXjYARl PhqlRuSwqagaXZ9mqn46vQ+uoIizEBVHpP6BlOyEBsXoI471NE/kOVW+yjdx9p2m ezgcsR/rbl6UZ1JX2GhW37eA4QOrl5EfZfuLcPWIAqGaqFCA+NspsTEaKG+RRL9i 4ppDPvToanxt6cxLddjmX+Uiohygf5tZmz9m7YCgTXaBjvZ5pgU= =k08f -----END PGP SIGNATURE-----