Debian Bug report logs -
#961415
symfony: CVE-2020-5275 CVE-2020-5274 CVE-2020-5255
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian PHP PEAR Maintainers <pkg-php-pear@lists.alioth.debian.org>
:
Bug#961415
; Package src:symfony
.
(Sun, 24 May 2020 11:27:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian PHP PEAR Maintainers <pkg-php-pear@lists.alioth.debian.org>
.
(Sun, 24 May 2020 11:27:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: symfony
Version: 4.4.4-1
Severity: grave
Tags: security upstream
Hi,
The following vulnerabilities were published for symfony.
CVE-2020-5275[0]:
| In symfony/security-http before versions 4.4.7 and 5.0.7, when a
| `Firewall` checks access control rule, it iterate overs each rule's
| attributes and stops as soon as the accessDecisionManager decides to
| grant access on the attribute, preventing the check of next attributes
| that should have been take into account in an unanimous strategy. The
| accessDecisionManager is now called with all attributes at once,
| allowing the unanimous strategy being applied on each attribute. This
| issue is patched in versions 4.4.7 and 5.0.7.
CVE-2020-5274[1]:
| In Symfony before versions 5.0.5 and 4.4.5, some properties of the
| Exception were not properly escaped when the `ErrorHandler` rendered
| it stacktrace. In addition, the stacktrace were displayed even in a
| non-debug configuration. The ErrorHandler now escape alls properties
| of the exception, and the stacktrace is only display in debug
| configuration. This issue is patched in symfony/http-foundation
| versions 4.4.5 and 5.0.5
CVE-2020-5255[2]:
| In Symfony before versions 4.4.7 and 5.0.7, when a `Response` does not
| contain a `Content-Type` header, affected versions of Symfony can
| fallback to the format defined in the `Accept` header of the request,
| leading to a possible mismatch between the response&#39;s content
| and `Content-Type` header. When the response is cached, this can
| prevent the use of the website by other users. This has been patched
| in versions 4.4.7 and 5.0.7.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-5275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5275
[1] https://security-tracker.debian.org/tracker/CVE-2020-5274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5274
[2] https://security-tracker.debian.org/tracker/CVE-2020-5255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5255
Regards,
Salvatore
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun May 24 13:38:41 2020;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.