[SECURITY] [DLA 3262-1] smarty3 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3262-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
January 05, 2023 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : smarty3
Version : 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2
CVE ID : CVE-2018-25047
Debian Bug : 1019897
It was discovered that there was a potential cross-site scripting
vulnerability in smarty3, a widely-used PHP templating engine.
For Debian 10 buster, this problem has been fixed in version
3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2.
We recommend that you upgrade your smarty3 packages.
For the detailed security status of smarty3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty3
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=P0/z
-----END PGP SIGNATURE-----
Reply to: