Template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Reference: https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m
Created php-Smarty tracking bugs for this issue: Affects: epel-7 [bug 2044971] Affects: fedora-all [bug 2044970]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.