-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3888-1 [email protected] https://www.debian.org/lts/security/ Adrian Bunk September 16, 2024 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : php-twig Version : 2.14.3-1+deb11u3 CVE ID : CVE-2024-45411 Debian Bug : 1081561 A possible sandbox bypass has been fixed in php-twig, a template engine for PHP For Debian 11 bullseye, this problem has been fixed in version 2.14.3-1+deb11u3. We recommend that you upgrade your php-twig packages. For the detailed security status of php-twig please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php-twig Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmboA1QACgkQiNJCh6LY mLH8iA//db0gbciZMDoWfpUhrk5SiOHP/agBhwWDCLh6xIesnFgwdHP3z6/rqY01 UXwvuoaZhPA4dbZn0QfXsmls7oe1cHn/FFvcrmYL8/N3elXQAVa8ZUbFxjeOhW2C Di6Vs1625I+QTluq5JnDBfpEcrpzxkwJXQYUA5oZJsO5uW5BaeV9b+jEodCGhWFA okgATXFGj4Ct7xgGRthyGKnjOzkW0EpfRGBsP3UIzLixFcxSE+cA37e4qR9hgwPe pRn6FWj7RJrTeS7qlm/EGGtWU5cWFawi5gUW1rec2THwZQFwof17jyBiHfAPssBq Q+J/Xq/TE1pom/WpwgPBwBnBz+xUJeZ8soyMdfQVR+eKbuc+xJ/EZO8wyZTRgzDa y88kpVeOdTmAQ3LVCMlvBZaPQSawcf1l1+SoJZdcmYe+Uh/IcDSOu8dUgw7edgaf WkMTJhcXSxhqnK78dFh2PXasWeG6ZFbWzHHSnOawZyzeK38gvoEpsc3KJnzaNfnB b+CK2LghR5dKny1bLOPN/7JRsKIlVmbZXZKbubkW6t3K9LMjE5hlG/rb2+ahdYgt hf3Iw+8SosdJ/NNZhSBm92IKZjJnRx+0OliHVts/14QsQEdlzRWt30s0X1D6rg3S o9j9yuaxSfNAxYyry/nxFGPbYKEJTTH2Yxegl1h9EHiTh26O5oo= =zLy5 -----END PGP SIGNATURE-----
