* SECURITY UPDATE: (LP: #202422)
+ libs/plugins/modifier.regex_replace.php
- The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used
by Serendipity (S9Y) and other products, allows attackers to call arbitrary
PHP functions via templates, related to a '\0' character in a search string.
smarty (2.6.11-1ubuntu0.1) dapper-security; urgency=low
* SECURITY UPDATE: (LP: #202422) modifier. regex_replace. php regex_replace. php plugin in Smarty before 2.6.19, as used
+ libs/plugins/
- The modifier.
by Serendipity (S9Y) and other products, allows attackers to call arbitrary
PHP functions via templates, related to a '\0' character in a search string.
* References cve.mitre. org/cgi- bin/cvename. cgi?name= CVE-2008- 1066 bugs.debian. org/cgi- bin/bugreport. cgi?bug= 469492
+ http://
+ http://
-- Emanuele Gentili <email address hidden> Sat, 15 Mar 2008 07:33:32 +0100