[Git][security-tracker-team/security-tracker][master] Document new symfony issues
David Prévot
taffit at debian.org
Tue Mar 31 01:06:08 BST 2020
David Prévot pushed to branch master at Debian Security Tracker / security-tracker
Commits:
2228b107 by David Prévot at 2020-03-30T14:05:12-10:00
Document new symfony issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -13433,10 +13433,19 @@ CVE-2020-5277 (PrestaShop module ps_facetedsearch versions before 3.5.0 has a re
NOT-FOR-US: PrestaShop
CVE-2020-5276
RESERVED
-CVE-2020-5275
- RESERVED
-CVE-2020-5274
- RESERVED
+CVE-2020-5275 [All "access_control" rules are required when a firewall uses the unanimous strategy]
+ - synfony <unfixed>
+ [buster] - symfony <not-affected> (Introduced in 4.4.0)
+ [stretch] - symfony <not-affected> (Introduced in 4.4.0)
+ NOTE: https://symfony.com/blog/cve-2020-5275-all-access-control-rules-are-required-when-a-firewall-uses-the-unanimous-strategy
+ NOTE: https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf
+CVE-2020-5274 [Fix Exception message escaping rendered by ErrorHandler]
+ - synfony <unfixed>
+ [buster] - symfony <not-affected> (Introduced in 4.4.0)
+ [stretch] - symfony <not-affected> (Introduced in 4.4.0)
+ NOTE: https://symfony.com/blog/cve-2020-5274-fix-exception-message-escaping-rendered-by-errorhandler
+ NOTE: https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad
+ NOTE: https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db
CVE-2020-5273
RESERVED
CVE-2020-5272
@@ -13486,8 +13495,12 @@ CVE-2020-5257 (In Administrate (rubygem) before version 0.13.0, when sorting by
NOT-FOR-US: Administrate ruby gem
CVE-2020-5256 (BookStack before version 0.25.5 has a vulnerability where a user could ...)
NOT-FOR-US: BookStack
-CVE-2020-5255
- RESERVED
+CVE-2020-5255 [Prevent cache poisoning via a Response Content-Type header]
+ - synfony <unfixed>
+ [buster] - symfony <not-affected> (Introduced in 4.4.0)
+ [stretch] - symfony <not-affected> (Introduced in 4.4.0)
+ NOTE: https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header
+ NOTE: https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6
CVE-2020-5254 (In NetHack before 3.6.6, some out-of-bound values for the hilite_statu ...)
- nethack <unfixed> (bug #953978)
[buster] - nethack <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2228b107eaff50f422c0d715a2569a3e983a653a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2228b107eaff50f422c0d715a2569a3e983a653a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200331/0edb74f7/attachment.html>
More information about the debian-security-tracker-commits
mailing list