Mageia 2018-0403: php-smarty security update
Summary
Smarty 3.1.32 or below is prone to a path traversal vulnerability due to
insufficient template code sanitization. This allows attackers controlling
the executed template code to bypass the trusted directory security
restriction and read arbitrary files (CVE-2018-13982).
References
- https://bugs.mageia.org/show_bug.cgi?id=23592
- https://www.openwall.com/lists/oss-security/2018/09/17/4
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13982
Resolution
MGASA-2018-0403 - Updated php-smarty packages fix security vulnerability
SRPMS
- 6/core/php-smarty-3.1.33-1.2.mga6