[Git][security-tracker-team/security-tracker][master] Document new symfony issues

David Prévot taffit at debian.org
Tue Mar 31 01:06:08 BST 2020



David Prévot pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2228b107 by David Prévot at 2020-03-30T14:05:12-10:00
Document new symfony issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -13433,10 +13433,19 @@ CVE-2020-5277 (PrestaShop module ps_facetedsearch versions before 3.5.0 has a re
 	NOT-FOR-US: PrestaShop
 CVE-2020-5276
 	RESERVED
-CVE-2020-5275
-	RESERVED
-CVE-2020-5274
-	RESERVED
+CVE-2020-5275 [All "access_control" rules are required when a firewall uses the unanimous strategy]
+	- synfony <unfixed>
+	[buster] - symfony <not-affected> (Introduced in 4.4.0)
+	[stretch] - symfony <not-affected> (Introduced in 4.4.0)
+	NOTE: https://symfony.com/blog/cve-2020-5275-all-access-control-rules-are-required-when-a-firewall-uses-the-unanimous-strategy
+	NOTE: https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf
+CVE-2020-5274 [Fix Exception message escaping rendered by ErrorHandler]
+	- synfony <unfixed>
+	[buster] - symfony <not-affected> (Introduced in 4.4.0)
+	[stretch] - symfony <not-affected> (Introduced in 4.4.0)
+	NOTE: https://symfony.com/blog/cve-2020-5274-fix-exception-message-escaping-rendered-by-errorhandler
+	NOTE: https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad
+	NOTE: https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db
 CVE-2020-5273
 	RESERVED
 CVE-2020-5272
@@ -13486,8 +13495,12 @@ CVE-2020-5257 (In Administrate (rubygem) before version 0.13.0, when sorting by
 	NOT-FOR-US: Administrate ruby gem
 CVE-2020-5256 (BookStack before version 0.25.5 has a vulnerability where a user could ...)
 	NOT-FOR-US: BookStack
-CVE-2020-5255
-	RESERVED
+CVE-2020-5255 [Prevent cache poisoning via a Response Content-Type header]
+	- synfony <unfixed>
+	[buster] - symfony <not-affected> (Introduced in 4.4.0)
+	[stretch] - symfony <not-affected> (Introduced in 4.4.0)
+	NOTE: https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header
+	NOTE: https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6
 CVE-2020-5254 (In NetHack before 3.6.6, some out-of-bound values for the hilite_statu ...)
 	- nethack <unfixed> (bug #953978)
 	[buster] - nethack <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2228b107eaff50f422c0d715a2569a3e983a653a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2228b107eaff50f422c0d715a2569a3e983a653a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200331/0edb74f7/attachment.html>


More information about the debian-security-tracker-commits mailing list