DSA-5248-1 php-twig -- security update

Related Vulnerabilities: CVE-2022-39261  

Marlon Starkloff discovered that twig, a template engine for PHP, did not correctly enforce sandboxing. This would allow a malicious user to execute arbitrary code. For the stable distribution (bullseye), this problem has been fixed in version 2.14.3-1+deb11u2. We recommend that you upgrade your php-twig packages. For the detailed security status of php-twig please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php-twig

Debian Security Advisory

DSA-5248-1 php-twig -- security update

Date Reported:
04 Oct 2022
Affected Packages:
php-twig
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1020991.
In Mitre's CVE dictionary: CVE-2022-39261.
More information:

Marlon Starkloff discovered that twig, a template engine for PHP, did not correctly enforce sandboxing. This would allow a malicious user to execute arbitrary code.

For the stable distribution (bullseye), this problem has been fixed in version 2.14.3-1+deb11u2.

We recommend that you upgrade your php-twig packages.

For the detailed security status of php-twig please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php-twig