Debian Security Advisory DSA-4094-1 [email protected]
https://www.debian.org/security/
January 22, 2018 https://www.debian.org/security/faq
Package : smarty3
CVE ID : CVE-2017-1000480
Debian Bug : 886460
It was discovered that Smarty, a PHP template engine, was vulnerable to
code-injection attacks. An attacker was able to craft a filename in
comments that could lead to arbitrary code execution on the host running
Smarty.
For the oldstable distribution (jessie), this problem has been fixed
in version 3.1.21-1+deb8u1.
For the stable distribution (stretch), this problem has been fixed in
version 3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u1.
We recommend that you upgrade your smarty3 packages.
For the detailed security status of smarty3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | smarty3 | < 3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u1 | smarty3_3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u1_all.deb |
Debian | 8 | all | smarty3 | < 3.1.21-1+deb8u1 | smarty3_3.1.21-1+deb8u1_all.deb |
Debian | 7 | all | smarty3 | < 3.1.10-2+deb7u2 | smarty3_3.1.10-2+deb7u2_all.deb |