[SECURITY] [DSA 5826-1] smarty3 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5826-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 10, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : smarty3
CVE ID : CVE-2023-28447 CVE-2024-35226
Two security vulnerabilities were discovered in Smarty, a template
engine for PHP, which could result in PHP code injection or cross-site
scripting.
For the stable distribution (bookworm), these problems have been fixed in
version 3.1.47-2+deb12u1.
We recommend that you upgrade your smarty3 packages.
For the detailed security status of smarty3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=k08f
-----END PGP SIGNATURE-----
Reply to: