drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Twig
| Name: |
Zwei Probleme in Twig |
|
| ID: |
USN-7456-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS |
|
| Datum: |
Do, 24. April 2025, 22:14 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-51754
https://www.cve.org/CVERecord?id=CVE-2024-45411 |
|
| Applikationen: |
Twig |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3102233803335183471== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------0y5iefBMhDA0XdK7Hy0yQVzj"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------0y5iefBMhDA0XdK7Hy0yQVzj Content-Type: multipart/mixed; boundary="------------yCmSbQVOK82qY1AvuiS0HlFj"; protected-headers="v1" From: Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Reply-To: security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <5652ead3-171d-423a-ac08-6f53031c9b0a@canonical.com> Subject: [USN-7456-1] Twig vulnerabilities
--------------yCmSbQVOK82qY1AvuiS0HlFj Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7456-1 April 24, 2025
php-twig vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Twig.
Software Description: - php-twig: Flexible, fast, and secure template engine for PHP
Details:
Fabien Potencier discovered that Twig did not run sandbox security checks in some circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-45411)
Jamie Schouten discovered that Twig could bypass the security policy for an object call. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-51754)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.04 LTS php-twig 3.8.0-2ubuntu0.1~esm1 Available with Ubuntu Pro
Ubuntu 22.04 LTS php-twig 3.3.8-2ubuntu4+esm2 Available with Ubuntu Pro
Ubuntu 20.04 LTS php-twig 2.12.5-1ubuntu0.1~esm2 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7456-1 CVE-2024-45411, CVE-2024-51754
--------------yCmSbQVOK82qY1AvuiS0HlFj--
--------------0y5iefBMhDA0XdK7Hy0yQVzj Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEELOLXZEFYQHcSWEHiyfW2m9Ldu6sFAmgKWywFAwAAAAAACgkQyfW2m9Ldu6s0 OQ//aikJi+hyajBvi8FhuMV3VxkzTCR8dR4K00+HCu1qX9u2f5Q251DiDo7Lc4g9Do5i0DmLtVLi Qgmy5bpNeVS9AEfEPb7K2z2IW8Vj5HJqDyExTSphQNElQbttJamDTdRRhKi8KwhTZkcgmp+pS3cB 8qiQEqY/wzUI+OLRQc/TKEYMgN2DBw51wzAjyL4g1apcn1j3bsowhJp1FquO5Wa/sPcXmB9sfKYz 2Th34hNm7hzzs6RBK759RBxxLWdCDLFV+4h5DtnQVbqTYeCviBf/o+VAWSxbysS8agQUn/DGzK10 NPBafFxIGf7pXvLwmIiwzUjAMGecdndw0L92WsPp0AaRGFJe1trwWSJG0shk8GU++EGEF/cJlP4x ehI4HYnlwwcsf9K2xAAPJiwCzjYIt5b8X2//K9QAnEKvxzKJuiWH9eF9BdVGhpLU2FT9GDvKPXFj pw+lNEPMa+ezL4fQLCaMSAWbo5NimeUByY8PQYUuBhnk+t0CA96VLb5dqPu9eOdwXGhnsgIprAgF hg37YYAFsPFcNPnb3XRtAqhCxLbjfE4Pki25DPlP1S2LBaNBGewTV3rJW+3O1sUKGMNuq9DFQMUc mza8/0eWqqFcGzmXzOEV5266251ZpPGjrqht+8advbt7fcv0ym9l+uwBgawaQiENPEfKIABGkHfq aac= =4420 -----END PGP SIGNATURE-----
--------------0y5iefBMhDA0XdK7Hy0yQVzj--
--===============3102233803335183471== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============3102233803335183471==--
|
|
|
|