----------------------------------------------------------------------------------
@MSGID:
<5aa49dd7-9015-b231-f7ef-bbb0cd861c96@canonical.com> 167f3809
@REPLY:
9kmaxKEkxkGtHdUHs2F0BfmbA@mail.gmail.com> 7a313fcc
@REPLYADDR George-Andrei Iosif
<andrei.iosif@canonical.com>
@REPLYTO 2:5075/128 George-Andrei Iosif
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<5aa49dd7-9015-b231-f7ef-bbb0cd861c96@canonical.com>
@RFC-References:
9kmaxKEkxkGtHdUHs2F0BfmbA@mail.gmail.com>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============2211158815846022272=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: 0300
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-6012-1
April 13, 2023
smarty3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
Summary:
Smarty could be made to crash or run programs if it received a specially
crafted template.
Software Description:
- smarty3: The compiling PHP template engine
Details:
It was discovered that Smarty incorrectly parsed blocks` names and
included files` names. A remote attacker with template writing permissions
could use this issue to execute arbitrary PHP code. (CVE-2022-29221)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.10:
smarty3 3.1.39-2ubuntu1.22.10.1
Ubuntu 22.04 LTS:
smarty3 3.1.39-2ubuntu1.22.04.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6012-1
CVE-2022-29221
Package Information:
https://launchpad.net/ubuntu/+source/smarty3/3.1.39-2ubuntu1.22.10.1
https://launchpad.net/ubuntu/+source/smarty3/3.1.39-2ubuntu1.22.04.1
--- FIDOGATE 5.12-ge4e8b94
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441