DSA-5151-1 smarty3 -- security update

Related Vulnerabilities: CVE-2021-21408   CVE-2021-26119   CVE-2021-26120   CVE-2021-29454   CVE-2022-29221  

Several security vulnerabilities have been discovered in smarty3, the compiling PHP template engine. Template authors are able to run restricted static php methods or even arbitrary PHP code by crafting a malicious math string or by choosing an invalid {block} or {include} file name. If a math string was passed through as user provided data to the math function, remote users were able to run arbitrary PHP code as well. For the oldstable distribution (buster), these problems have been fixed in version 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 3.1.39-2+deb11u1. We recommend that you upgrade your smarty3 packages. For the detailed security status of smarty3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/smarty3

Debian Security Advisory

DSA-5151-1 smarty3 -- security update

Date Reported:
29 May 2022
Affected Packages:
smarty3
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1010375, Bug 1011758.
In Mitre's CVE dictionary: CVE-2021-21408, CVE-2021-26119, CVE-2021-26120, CVE-2021-29454, CVE-2022-29221.
More information:

Several security vulnerabilities have been discovered in smarty3, the compiling PHP template engine. Template authors are able to run restricted static php methods or even arbitrary PHP code by crafting a malicious math string or by choosing an invalid {block} or {include} file name. If a math string was passed through as user provided data to the math function, remote users were able to run arbitrary PHP code as well.

For the oldstable distribution (buster), these problems have been fixed in version 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u1.

For the stable distribution (bullseye), these problems have been fixed in version 3.1.39-2+deb11u1.

We recommend that you upgrade your smarty3 packages.

For the detailed security status of smarty3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/smarty3