[pkg-php-pear] symfony_7.4.12+dfsg-1_source.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Wed May 20 21:34:22 BST 2026


Thank you for your contribution to Debian.



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 20 May 2026 21:29:52 +0200
Source: symfony
Architecture: source
Version: 7.4.12+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers <pkg-php-pear at lists.alioth.debian.org>
Changed-By: David Prévot <taffit at debian.org>
Changes:
 symfony (7.4.12+dfsg-1) unstable; urgency=medium
 .
   [ Alexandre Daubois ]
   * [Routing] Fix regex alternation anchoring in UrlGenerator requirement
     validation [CVE-2026-45065]
   * [DomCrawler] Fix XXE in addXmlContent() by not enabling `validateOnParse`
     [CVE-2026-45071]
   * [HtmlSanitizer] Fix allowLinkHosts/allowMediaHosts bypass via URL parser
     differentials and <area> misclassification [CVE-2026-45066]
   * [Security] Add missing claims in `OidcTokenHandler` [CVE-2026-45069]
   * [Security] Anchor emailAddress regex to RDN boundary in X509Authenticator
     [CVE-2026-45063]
   * [Mime] Reject email addresses containing line breaks in Address
     [CVE-2026-45067]
   * [Mailer] Add end-of-options separator before recipients in
     SendmailTransport; reject addresses starting with a dash [CVE-2026-45068]
   * [JsonPath] Cap regex backtracking in match()/search() to prevent ReDoS
     [CVE-2026-45756]
   * [Mailer][Mailjet] Reject webhooks with missing or invalid Basic credentials
     [CVE-2026-45754]
   * [Mailer][Mailtrap] Reject webhooks with missing or invalid HMAC signature
     [CVE-2026-45755]
 .
   [ Nicolas Grekas ]
   * [HtmlSanitizer] Reject BiDi override characters and percent-encode spaces
     in URLs [CVE-2026-45064]
   * [MonologBridge] Bind server:log to localhost by default [CVE-2026-45077]
   * [Security][HttpKernel] Fix HEAD requests bypassing methods filter in
     `IsGranted`, `IsCsrfTokenValid` and `IsSignatureValid` attributes
     [CVE-2026-45075]
   * [Yaml] Bound recursion depth in the parser [CVE-2026-45133]
   * [TwigBridge] Fix XSS issue in CodeExtension::fileExcerpt() [CVE-2026-45072]
   * [Cache] Validate the prefix given to AbstractAdapter::clear()
     [CVE-2026-45073]
   * [Yaml] Bound collection-alias resolution in the parser [CVE-2026-45304]
   * [Yaml] Harden the Parser::cleanup() regexes against catastrophic
     backtracking [CVE-2026-45305]
   * [Security] Require configuring trusted hosts when using CAS authentication
     [CVE-2026-45074]
   * [Notifier][Lox24] Reject webhooks with missing or invalid token
     [CVE-2026-45754]
   * [Notifier][Twilio] Reject webhooks with missing or invalid HMAC signature
     [CVE-2026-47212]
   * [HtmlSanitizer] Sanitize URLs in action, formaction, poster and cite
     attributes [CVE-2026-45753]
   * [Runtime] Fix CVE-2024-50340 patch bypass by gating argv on
     $_SERVER['QUERY_STRING'] [CVE-2026-46626]
 .
   [ Fabien Potencier ]
   * Update VERSION for 7.4.12
Checksums-Sha1:
 8c8bbffceb8cbdd48b7f0d1510bdd9c29260c6d6 19155 symfony_7.4.12+dfsg-1.dsc
 d3460cbba6435d135031a6124cb770d5125f2be0 9379696 symfony_7.4.12+dfsg.orig.tar.xz
 9415ee45b4d795045efedce3b43dd3b583c604d1 81268 symfony_7.4.12+dfsg-1.debian.tar.xz
 01dcb1743d41bcd749ad3b31965c01f53fb65c8d 74710 symfony_7.4.12+dfsg-1_amd64.buildinfo
Checksums-Sha256:
 053623a631c3f67b509830671af00396a8fbfefc654580681cacd1fdb99d3d1b 19155 symfony_7.4.12+dfsg-1.dsc
 59e2e5a3d8451fd719bffc4d4ecfa713856318e768dd64d428c2748f95da5899 9379696 symfony_7.4.12+dfsg.orig.tar.xz
 f3b6bb74223e9e155535bb2b4e70e75a3bd88d674cd2bb157794c497ce14e173 81268 symfony_7.4.12+dfsg-1.debian.tar.xz
 2f97ac8af306aaf111ad30558731415ac86fce31e0a5d2eba16f71beac509efd 74710 symfony_7.4.12+dfsg-1_amd64.buildinfo
Files:
 957f195ed2a683633f7ac4d2d1c5352a 19155 php optional symfony_7.4.12+dfsg-1.dsc
 56e8175f4716d2fae9969b1e69d8c21d 9379696 php optional symfony_7.4.12+dfsg.orig.tar.xz
 529c0d86518cf3421319add1b5b5c8b3 81268 php optional symfony_7.4.12+dfsg-1.debian.tar.xz
 7ef0106e0b3f4db3ffa916f7cca1c90e 74710 php optional symfony_7.4.12+dfsg-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQFGBAEBCgAwFiEEeHVNB7wJXHRI941mBYwc+UT2vTwFAmoOEWcSHHRhZmZpdEBk
ZWJpYW4ub3JnAAoJEAWMHPlE9r08TNoH/jBV6odVyPPKAMXtvJmGgI86VMsdiSsU
tI3n7qKvY46hc+L55qEQq8HegZYXJRiHIoLY1WXSCN1WS5VuKxdrFCN1GfRmFJX3
tPiAYUd9QT4mxO1D9pR9wnfGVMu0MBw0MuGPQhXo/IrTQwshvnI+Gb4evWoNFGW7
duMmCOj4YnGYrEj6t+jB+yn0NbKbTDP3RoXPO4QoG+FcnF+ncrlk33G/gl6s8jzT
ZS6OQo/kPYmBJdPHXzslJTwCCaZrDok/CJVav8KCnf+EN6sM5bBNvedG35g/us8v
TlEOL0jK40hk7khnqpx7exaATqqmg3UlTI9c2FU4jibEbGsQ4N2so2g=
=OMas
-----END PGP SIGNATURE-----

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-php-pear/attachments/20260520/06fc0024/attachment.sig>


More information about the pkg-php-pear mailing list