|
|
Subscribe / Log in / New account

Mageia alert MGASA-2018-0403 (php-smarty)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2018-0403: Updated php-smarty packages fix security vulnerability
Date:  Fri, 19 Oct 2018 20:01:36 +0200
Message-ID:  <20181019180136.1236DA0017@duvel.mageia.org>

MGASA-2018-0403 - Updated php-smarty packages fix security vulnerability Publication date: 19 Oct 2018 URL: https://advisories.mageia.org/MGASA-2018-0403.html Type: security Affected Mageia releases: 6 CVE: CVE-2018-13982 Description: Smarty 3.1.32 or below is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files (CVE-2018-13982). References: - https://bugs.mageia.org/show_bug.cgi?id=23592 - https://www.openwall.com/lists/oss-security/2018/09/17/4 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... SRPMS: - 6/core/php-smarty-3.1.33-1.2.mga6


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds