{"id":"MGASA-2018-0484","summary":"Updated php packages fix security vulnerability","details":"Bypassing disabled exec functions in PHP via imap_open (CVE-2018-19518).\n","modified":"2026-02-04T03:03:35.028431Z","published":"2018-12-20T20:17:27Z","related":["CVE-2018-19518"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0484.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=23945"}],"affected":[{"package":{"name":"php","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/php?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.6.39-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0484.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}