commit a5cd4c0ad1f411d44ac67811aa960145657c3346
Author: Elan Ruusamäe <[email protected]>
Date:   Mon May 23 15:17:00 2022 +0300

    Up to 3.1.45 (2022-05-17), This addresses CVE-2022-29221
    
    Prevent PHP injection through malicious block name or include file name.

 php-Smarty.spec | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
---
diff --git a/php-Smarty.spec b/php-Smarty.spec
index 50fd9ac..78d11cb 100644
--- a/php-Smarty.spec
+++ b/php-Smarty.spec
@@ -2,7 +2,7 @@
 # Conditional build:
 %bcond_with    bc              # build BC wrapper as default Smarty class
 
-%define                main_version 3.1.36
+%define                main_version 3.1.45
 %define                doc_version     3.1.14
 %define                rel     1
 %define                php_min_version 5.2.0
@@ -14,7 +14,7 @@ Release:      %{rel}%{?with_bc:BC}
 License:       LGPL v3
 Group:         Development/Languages/PHP
 Source0:       
https://github.com/smarty-php/smarty/archive/v%{version}/smarty-%{version}.tar.gz
-# Source0-md5: bebb713b0084665b0d59302f2d00c435
+# Source0-md5: c1b5d7acb43485c43973f0fb1e0d64c6
 # Source1Download: http://www.smarty.net/documentation
 Source1:       http://www.smarty.net/files/docs/manual-en.%{doc_version}.zip
 # Source1-md5: f54b1dd458776e4b1ccfdbfbfda1f484
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/php-Smarty.git/commitdiff/a5cd4c0ad1f411d44ac67811aa960145657c3346

_______________________________________________
pld-cvs-commit mailing list
[email protected]
http://lists.pld-linux.org/mailman/listinfo/pld-cvs-commit

Reply via email to