Your message dated Tue, 11 Oct 2022 18:32:40 +0000
with message-id <e1oik3u-00hnwv...@fasolo.debian.org>
and subject line Bug#1020991: fixed in php-twig 2.14.3-1+deb11u2
has caused the Debian Bug report #1020991,
regarding php-twig: CVE-2022-39261
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1020991: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020991
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: php-twig
Version: 3.4.2-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for php-twig.

CVE-2022-39261[0]:
| Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x
| prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the
| filesystem loader loads templates for which the name is a user input.
| It is possible to use the `source` or `include` statement to read
| arbitrary files from outside the templates' directory when using a
| namespace like `@somewhere/../some.file`. In such a case, validation
| is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for
| validation of such template names. There are no known workarounds
| aside from upgrading.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-39261
    https://www.cve.org/CVERecord?id=CVE-2022-39261
[1] https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
[2] 
https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: php-twig
Source-Version: 2.14.3-1+deb11u2
Done: David Prévot <dpre...@evolix.fr>

We believe that the bug you reported is fixed in the latest version of
php-twig, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1020...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Prévot <dpre...@evolix.fr> (supplier of updated php-twig package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 30 Sep 2022 11:22:27 +0200
Source: php-twig
Architecture: source
Version: 2.14.3-1+deb11u2
Distribution: bullseye-security
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers <pkg-php-p...@lists.alioth.debian.org>
Changed-By: David Prévot <dpre...@evolix.fr>
Closes: 1020991
Changes:
 php-twig (2.14.3-1+deb11u2) bullseye-security; urgency=medium
 .
   [ David Prevot ]
   * Backport security fix from 3.4.3 [CVE-2022-39261]
     Fix possibility to load a template outside a configured directory
     when using the filesystem loader. (Closes: #1020991)
Checksums-Sha1:
 57b6e1cf9fcfa53524b812a43b85deaed32d951a 2669 php-twig_2.14.3-1+deb11u2.dsc
 974e2c1198dd096a2a48cc6e15c63bda763dc1af 18040 
php-twig_2.14.3-1+deb11u2.debian.tar.xz
 da6e71ff934980faadbfd75c92233da6ee119c40 13280 
php-twig_2.14.3-1+deb11u2_amd64.buildinfo
Checksums-Sha256:
 4d42ed4112ef8a90bb7cb9d300948298f509bac458aa19c310d7627df91c7fe5 2669 
php-twig_2.14.3-1+deb11u2.dsc
 258951a256253e2abfcd955ab8c116e106914a5e657eb4042b9e64e6b60f902f 18040 
php-twig_2.14.3-1+deb11u2.debian.tar.xz
 e1a727b337c0f50d233ef3d1c5b1ab24b4ef52d5ddb03bcb05667150c440461e 13280 
php-twig_2.14.3-1+deb11u2_amd64.buildinfo
Files:
 70bdcfb43ea3f412aafe62bc17222164 2669 php optional 
php-twig_2.14.3-1+deb11u2.dsc
 533e9bc26c32765d152b01fe3765c7a8 18040 php optional 
php-twig_2.14.3-1+deb11u2.debian.tar.xz
 94f77be53255669089d40e70c2429ab5 13280 php optional 
php-twig_2.14.3-1+deb11u2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEeHVNB7wJXHRI941mBYwc+UT2vTwFAmM7OB8ACgkQBYwc+UT2
vTw6fgf+OgjT2OxUxV2QFDWLn+3I4mZ7+Whs5Khs4Vhcy/esNOsF+J16zkDenUOF
IHsxBbslDdCFRCPwLLAedadg67L3Xe05Pqoh/dxtJwGE3FR2DwIuBNolRjf/TbWq
gpek7GB0lKhJD39/FYjglqbwkik+haCK06ejocXC/r3gPWDjPBAHgQE4/bGSxBhH
ToSvZFrEpFApbRb8vKdTKSWURQflUizR7MscBH9OljsdfLoe5fSWQbLQC//VK0Hv
pnSE7wGFlgXlFIn5JzQoyTDNPsTE+2NQtpiOdiyvZiD1ZPzYX1w6Pqp+y2xyVVXJ
tAac023Umntr0/0glGo8KFkMqdgp1A==
=ckah
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to