-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5830-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 12, 2024 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : smarty4 CVE ID : CVE-2024-35226 A security vulnerability was discovered in Smarty, a template engine for PHP, which could result in PHP code injection. For the stable distribution (bookworm), this problem has been fixed in version 4.3.0-1+deb12u2. We recommend that you upgrade your smarty4 packages. For the detailed security status of smarty4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/smarty4 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmdbOaMACgkQEMKTtsN8 TjaL2g//V6UVdtLCmLQdphWYtANrMpdn8b/w6s5+C9zzxXruO8nj/DOpJYh5gbFb 9Qy27DG3pAz7DFVRn3PJo/0qp9FTp2uKZWgXPjr2iqnzt+ClcSbbL2HzY270g9S5 WVhqlmv7bEFM3+UNF6dsykWcz44EShYq4aITgXItIBgI0LuaYC3krbf9tQsfhNF4 TRslBiifvu3NfeiiVq6NLqdcnegIyJC+nvjycnyeL6t70ua2nlnM/uk3im1ql0rK JiCaeaqzjPANO0h0lJLEnpGjqNPqqN6T3HYosI+YdzB8jJ39vL24iA6k+oJ7Z37w yE3l9TRZC9Q673EEiWLBCaJ19HGY82g1UpRQ85RWPL1Kyqrh+G6ktfMvpAApnFru avLzeivIrawMVX9LHz/aho9BjgAxGlUuWlUH1E0TMEDAsyr4YdkcbY7ccf1zqVLH wK+77xL8OUlc8WfaiNIY8sn79RavB4Ri3pQJxoyTDO7xli7c8K4az38HaU48d4G+ pgvvJq1ZHSxcDnW4xLvEjlFy62OYu8wHR3qeEWeIfL/caZzKPOTXqvZbpHYmMVw8 vNGiVsQyBl0s65ao/dQ19eYvhBYZvVFKbSxnPidiczvm4QRBO4H+HodzPIxG60Ib URUQoaVl7yQ7DbcQL/6k/oklDzlNvhtWsd31b8CvC3v75fqS15A= =WHiV -----END PGP SIGNATURE-----