Source: php-twig Version: 3.14.0-4 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerabilities were published for php-twig. CVE-2024-51754[0]: | Twig is a template language for PHP. In a sandbox, an attacker can | call `__toString()` on an object even if the `__toString()` method | is not allowed by the security policy when the object is part of an | array or an argument list (arguments to a function or a filter for | instance). This issue has been patched in versions 3.11.2 and | 3.14.1. All users are advised to upgrade. There are no known | workarounds for this issue. CVE-2024-51755[1]: | Twig is a template language for PHP. In a sandbox, and attacker can | access attributes of Array-like objects as they were not checked by | the security policy. They are now checked via the property policy | and the `__isset()` method is now called after the security check. | This is a BC break. This issue has been patched in versions 3.11.2 | and 3.14.1. All users are advised to upgrade. There are no known | workarounds for this issue. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-51754 https://www.cve.org/CVERecord?id=CVE-2024-51754 https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6 [1] https://security-tracker.debian.org/tracker/CVE-2024-51755 https://www.cve.org/CVERecord?id=CVE-2024-51755 https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh Please adjust the affected versions in the BTS as needed. Regards, Salvatore