Fedora Linux 8815 Published by

A php-Smarty security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: php-Smarty-3.1.48-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-7490239652
2023-04-12 01:38:08.550951
--------------------------------------------------------------------------------

Name : php-Smarty
Product : Fedora 36
Version : 3.1.48
Release : 1.fc36
URL :   http://www.smarty.net
Summary : Smarty - the compiling PHP template engine
Description :
Smarty is a template engine for PHP, facilitating the separation of
presentation (HTML/CSS) from application logic. This implies that PHP
code is application logic, and is separated from the presentation.

Autoloader: /usr/share/php/Smarty/autoload.php

--------------------------------------------------------------------------------
Update Information:

## [3.1.48] - 2023-03-28 ### Security - Fixed Cross site scripting
vulnerability in Javascript escaping. This addresses CVE-2023-28447. ### Fixed
- Output buffer is now cleaned for internal PHP errors as well, not just for
Exceptions [#514](  https://github.com/smarty-php/smarty/issues/514)
--------------------------------------------------------------------------------
ChangeLog:

* Mon Apr 3 2023 Shawn Iwinski - 3.1.48-1
- Update to 3.1.48
- CVE-2023-28447 (RHBZ #2183911, 2183912, 21839123, 21839124)
* Fri Jan 20 2023 Fedora Release Engineering - 3.1.47-2
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2183912 - CVE-2023-28447 php-Smarty: Cross site scripting vulnerability in Javascript escaping [epel-7]
  https://bugzilla.redhat.com/show_bug.cgi?id=2183912
[ 2 ] Bug #2183913 - CVE-2023-28447 php-Smarty: Cross site scripting vulnerability in Javascript escaping [fedora-36]
  https://bugzilla.redhat.com/show_bug.cgi?id=2183913
[ 3 ] Bug #2183914 - CVE-2023-28447 php-Smarty: Cross site scripting vulnerability in Javascript escaping [fedora-37]
  https://bugzilla.redhat.com/show_bug.cgi?id=2183914
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-7490239652' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________