Lucene search

K
debianDebianDEBIAN:DLA-2618-3:B1B07
HistoryOct 20, 2021 - 12:08 p.m.

[SECURITY] [DLA 2618-3] smarty3 regression update

2021-10-2012:08:09
lists.debian.org
16
smarty3
security update
debian 9

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.003

Percentile

69.8%


Debian LTS Advisory DLA-2618-3 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
October 20, 2021 https://wiki.debian.org/LTS

Package : smarty3
Version : 3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u4
CVE ID : CVE-2018-13982
Debian Bug : 989141

The security update of smarty3, the compiling PHP template engine, issued as
DLA 2618-1 introduced a regression in the smarty_security class when secure
directories are evaluated. Updated smarty3 packages are now available to
correct this issue.

For Debian 9 stretch, this problem has been fixed in version
3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u4.

We recommend that you upgrade your smarty3 packages.

For the detailed security status of smarty3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty3

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

OSVersionArchitecturePackageVersionFilename
Debian9allsmarty3< 3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u2smarty3_3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u2_all.deb

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.003

Percentile

69.8%