[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3888-1] php-twig security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3888-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                          Adrian Bunk
September 16, 2024                            https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : php-twig
Version        : 2.14.3-1+deb11u3
CVE ID         : CVE-2024-45411
Debian Bug     : 1081561

A possible sandbox bypass has been fixed in php-twig,
a template engine for PHP

For Debian 11 bullseye, this problem has been fixed in version
2.14.3-1+deb11u3.

We recommend that you upgrade your php-twig packages.

For the detailed security status of php-twig please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-twig

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmboA1QACgkQiNJCh6LY
mLH8iA//db0gbciZMDoWfpUhrk5SiOHP/agBhwWDCLh6xIesnFgwdHP3z6/rqY01
UXwvuoaZhPA4dbZn0QfXsmls7oe1cHn/FFvcrmYL8/N3elXQAVa8ZUbFxjeOhW2C
Di6Vs1625I+QTluq5JnDBfpEcrpzxkwJXQYUA5oZJsO5uW5BaeV9b+jEodCGhWFA
okgATXFGj4Ct7xgGRthyGKnjOzkW0EpfRGBsP3UIzLixFcxSE+cA37e4qR9hgwPe
pRn6FWj7RJrTeS7qlm/EGGtWU5cWFawi5gUW1rec2THwZQFwof17jyBiHfAPssBq
Q+J/Xq/TE1pom/WpwgPBwBnBz+xUJeZ8soyMdfQVR+eKbuc+xJ/EZO8wyZTRgzDa
y88kpVeOdTmAQ3LVCMlvBZaPQSawcf1l1+SoJZdcmYe+Uh/IcDSOu8dUgw7edgaf
WkMTJhcXSxhqnK78dFh2PXasWeG6ZFbWzHHSnOawZyzeK38gvoEpsc3KJnzaNfnB
b+CK2LghR5dKny1bLOPN/7JRsKIlVmbZXZKbubkW6t3K9LMjE5hlG/rb2+ahdYgt
hf3Iw+8SosdJ/NNZhSBm92IKZjJnRx+0OliHVts/14QsQEdlzRWt30s0X1D6rg3S
o9j9yuaxSfNAxYyry/nxFGPbYKEJTTH2Yxegl1h9EHiTh26O5oo=
=zLy5
-----END PGP SIGNATURE-----


Reply to: