-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5771-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 17, 2024                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : php-twig
CVE ID         : CVE-2024-45411

Fabien Potencier discovered that under some conditions the sandbox
mechanism of Twig, a template engine for PHP, could by bypassed.

For the stable distribution (bookworm), this problem has been fixed in
version 3.5.1-1+deb12u1.

We recommend that you upgrade your php-twig packages.

For the detailed security status of php-twig please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-twig

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-5771-1: php-twig Security Advisory Updates

September 17, 2024
Fabien Potencier discovered that under some conditions the sandbox mechanism of Twig, a template engine for PHP, could by bypassed

Summary

Fabien Potencier discovered that under some conditions the sandbox
mechanism of Twig, a template engine for PHP, could by bypassed.

For the stable distribution (bookworm), this problem has been fixed in
version 3.5.1-1+deb12u1.

We recommend that you upgrade your php-twig packages.

For the detailed security status of php-twig please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-twig

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/



Severity
Package : php-twig
CVE ID : CVE-2024-45411

Related News