-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 20 May 2026 18:54:15 +0200
Source: symfony
Architecture: source
Version: 8.0.12+dfsg-1
Distribution: experimental
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers <[email protected]>
Changed-By: David Prévot <[email protected]>
Changes:
 symfony (8.0.12+dfsg-1) experimental; urgency=medium
 .
   [ Alexandre Daubois ]
   * [Routing] Fix regex alternation anchoring in UrlGenerator requirement
     validation [CVE-2026-45065]
   * [DomCrawler] Fix XXE in addXmlContent() by not enabling `validateOnParse`
     [CVE-2026-45071]
   * [HtmlSanitizer] Fix allowLinkHosts/allowMediaHosts bypass via URL parser
     differentials and <area> misclassification [CVE-2026-45066]
   * [Security] Add missing claims in `OidcTokenHandler` [CVE-2026-45069]
   * [Security] Anchor emailAddress regex to RDN boundary in X509Authenticator
     [CVE-2026-45063]
   * [Mime] Reject email addresses containing line breaks in Address
     [CVE-2026-45067]
   * [Mailer] Add end-of-options separator before recipients in
     SendmailTransport; reject addresses starting with a dash [CVE-2026-45068]
   * [JsonPath] Cap regex backtracking in match()/search() to prevent ReDoS
     [CVE-2026-45756]
   * [Mailer][Mailjet] Reject webhooks with missing or invalid Basic credentials
     [CVE-2026-45754]
   * [Mailer][Mailtrap] Reject webhooks with missing or invalid HMAC signature
     [CVE-2026-45755]
 .
   [ Nicolas Grekas ]
   * [HtmlSanitizer] Reject BiDi override characters and percent-encode spaces
     in URLs [CVE-2026-45064]
   * [MonologBridge] Bind server:log to localhost by default [CVE-2026-45077]
   * [Security][HttpKernel] Fix HEAD requests bypassing methods filter in
     `IsGranted`, `IsCsrfTokenValid` and `IsSignatureValid` attributes
     [CVE-2026-45075]
   * [Yaml] Bound recursion depth in the parser [CVE-2026-45133]
   * [TwigBridge] Fix XSS issue in CodeExtension::fileExcerpt() [CVE-2026-45072]
   * [Cache] Validate the prefix given to AbstractAdapter::clear()
     [CVE-2026-45073]
   * [Yaml] Bound collection-alias resolution in the parser [CVE-2026-45304]
   * [Yaml] Harden the Parser::cleanup() regexes against catastrophic
     backtracking [CVE-2026-45305]
   * [Security] Require configuring trusted hosts when using CAS authentication
     [CVE-2026-45074]
   * [Notifier][Lox24] Reject webhooks with missing or invalid token
     [CVE-2026-45754]
   * [Notifier][Twilio] Reject webhooks with missing or invalid HMAC signature
     [CVE-2026-47212]
   * [HtmlSanitizer] Sanitize URLs in action, formaction, poster and cite
     attributes [CVE-2026-45753]
   * [Runtime] Fix CVE-2024-50340 patch bypass by gating argv on
     $_SERVER['QUERY_STRING'] [CVE-2026-46626]
 .
   [ Fabien Potencier ]
   * Update VERSION for 8.0.12
Checksums-Sha1:
 bdeb5f68bec9c7f1e26c8efec8d33c51d5b4727d 19026 symfony_8.0.12+dfsg-1.dsc
 cb6cfe66c175f4f49c46903c211b606a3e161bfa 9198556 
symfony_8.0.12+dfsg.orig.tar.xz
 3c3a60ad75021c5e7f2357338a625a217db1f800 78824 
symfony_8.0.12+dfsg-1.debian.tar.xz
 b8b1b46a01a805748503e8cde8322c905d0a3328 74372 
symfony_8.0.12+dfsg-1_amd64.buildinfo
Checksums-Sha256:
 99e4dd118da4a1c9c03b0149103616a0f00c399ffac0e40455b3a60fdf9cd4bc 19026 
symfony_8.0.12+dfsg-1.dsc
 66be3990d18df7b1664704830e203c89de4263c6e61911845d434897520f87da 9198556 
symfony_8.0.12+dfsg.orig.tar.xz
 207db0251a32d10c09470c4ab80f3ffdba64f2d474dcf19de549343e69a6a4aa 78824 
symfony_8.0.12+dfsg-1.debian.tar.xz
 b0ec431e5e11417767e36a5a9daba246996c8ab22dbea0280be0abc238bf7d09 74372 
symfony_8.0.12+dfsg-1_amd64.buildinfo
Files:
 3ca33f4d5d1cecf2be3f87a384f804cf 19026 php optional symfony_8.0.12+dfsg-1.dsc
 9ac397ed1a31688c5b0408ce92b827b8 9198556 php optional 
symfony_8.0.12+dfsg.orig.tar.xz
 fb035ac2074c9da3bff90ea2e91bba4f 78824 php optional 
symfony_8.0.12+dfsg-1.debian.tar.xz
 1e728d8a7c0daae674af542f04457916 74372 php optional 
symfony_8.0.12+dfsg-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQFGBAEBCgAwFiEEeHVNB7wJXHRI941mBYwc+UT2vTwFAmoOCWESHHRhZmZpdEBk
ZWJpYW4ub3JnAAoJEAWMHPlE9r08MFQH/AxW9l6iUpBOhRnuz6tsAE4XoMf1bnaF
LgwVMFJdNTfd0IkBoljsO+ry/skSIMdFKYPGqp3H15MHOPpjNpyOni0I0+ZMS7Fr
wCDvGSG6ZzBVeLGh0NQodxQq/2CQ8dbN8+medDWd744UgHEUx1K92cmbKzrTIbdy
faf10pVUJnDmpvIloWn+RhHP315JZDWC5aQsCUdcwIeCZsJxfUQI+2Ynnp+qGzRE
ZAb1UfqBt1dkm8bKB8QyWRrA5kyIaQKLjclolqoL7IqWCUs1u9uIcEniDg+n5+WV
+x1Z59fB4iuspJpt5SVWeDU8pwpor3ny07mH5m55IPL4LTU+TQKksUQ=
=r9kl
-----END PGP SIGNATURE-----

Attachment: pgpXMYAJH6268.pgp
Description: PGP signature

Reply via email to