Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 845180 (CVE-2022-29221) - <dev-php/smarty-4.1.1: php injection via malicious block name or include file name
Summary: <dev-php/smarty-4.1.1: php injection via malicious block name or include file...
Status: IN_PROGRESS
Alias: CVE-2022-29221
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://github.com/smarty-php/smarty/...
Whiteboard: B2 [glsa?]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-05-17 14:26 UTC by John Helmert III
Modified: 2022-05-28 04:53 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-17 14:26:32 UTC
"- Prevent PHP injection through malicious block name or include file name. This addresses CVE-2022-29221"

Please bump to 4.1.1.
Comment 1 Larry the Git Cow gentoo-dev 2022-05-17 23:29:50 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=18834a17deb847788ac32a80f9ddaa2cff861560

commit 18834a17deb847788ac32a80f9ddaa2cff861560
Author:     Michael Orlitzky <mjo@gentoo.org>
AuthorDate: 2022-05-17 23:28:04 +0000
Commit:     Michael Orlitzky <mjo@gentoo.org>
CommitDate: 2022-05-17 23:28:04 +0000

    dev-php/smarty: add upstream v4.1.1 with a fix for CVE-2022-29221.
    
    Bug: https://bugs.gentoo.org/845180
    Package-Manager: Portage-3.0.30, Repoman-3.0.3
    Signed-off-by: Michael Orlitzky <mjo@gentoo.org>

 dev-php/smarty/Manifest            |  1 +
 dev-php/smarty/smarty-4.1.1.ebuild | 46 ++++++++++++++++++++++++++++++++++++++
 2 files changed, 47 insertions(+)
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-18 16:56:26 UTC
Thanks! Please stabilize when ready.
Comment 3 Larry the Git Cow gentoo-dev 2022-05-27 12:43:32 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b9e0097b154d630a2c16d3054640f77fec153d62

commit b9e0097b154d630a2c16d3054640f77fec153d62
Author:     Michael Orlitzky <mjo@gentoo.org>
AuthorDate: 2022-05-27 12:41:02 +0000
Commit:     Michael Orlitzky <mjo@gentoo.org>
CommitDate: 2022-05-27 12:41:02 +0000

    dev-php/smarty: security cleanup of old v4.0.4.
    
    Bug: https://bugs.gentoo.org/845180
    Package-Manager: Portage-3.0.30, Repoman-3.0.3
    Signed-off-by: Michael Orlitzky <mjo@gentoo.org>

 dev-php/smarty/Manifest            |  1 -
 dev-php/smarty/smarty-4.0.4.ebuild | 46 --------------------------------------
 2 files changed, 47 deletions(-)

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c0bf4e1b1264344c1cfeb88707c229f7f3ae1a5a

commit c0bf4e1b1264344c1cfeb88707c229f7f3ae1a5a
Author:     Michael Orlitzky <mjo@gentoo.org>
AuthorDate: 2022-05-27 12:39:12 +0000
Commit:     Michael Orlitzky <mjo@gentoo.org>
CommitDate: 2022-05-27 12:39:18 +0000

    dev-php/smarty: maintainer stabilize (ALLARCHES) the latest v4.1.1.
    
    Bug: https://bugs.gentoo.org/845180
    Package-Manager: Portage-3.0.30, Repoman-3.0.3
    Signed-off-by: Michael Orlitzky <mjo@gentoo.org>

 dev-php/smarty/smarty-4.1.1.ebuild | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-28 04:53:22 UTC
Thanks!