First published: Thu Apr 24 2025(Updated: )
Fabien Potencier discovered that Twig did not run sandbox security checks in some circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-45411) Jamie Schouten discovered that Twig could bypass the security policy for an object call. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-51754)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/php-twig | <3.8.0-2ubuntu0.1~esm1 | 3.8.0-2ubuntu0.1~esm1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/php-twig | <3.3.8-2ubuntu4+esm2 | 3.3.8-2ubuntu4+esm2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/php-twig | <2.12.5-1ubuntu0.1~esm2 | 2.12.5-1ubuntu0.1~esm2 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7456-1 is considered critical due to the potential for denial of service or execution of arbitrary commands.
To fix USN-7456-1, upgrade the php-twig package to the recommended versions 3.8.0-2ubuntu0.1~esm1 for Ubuntu 24.04, 3.3.8-2ubuntu4+esm2 for Ubuntu 22.04, or 2.12.5-1ubuntu0.1~esm2 for Ubuntu 20.04.
USN-7456-1 affects Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.
The vulnerability leading to USN-7456-1 was discovered by Fabien Potencier.
An attacker could potentially cause a denial of service or execute arbitrary commands by exploiting USN-7456-1.