David Prévot pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2228b107 by David Prévot at 2020-03-30T14:05:12-10:00
Document new symfony issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -13433,10 +13433,19 @@ CVE-2020-5277 (PrestaShop module ps_facetedsearch 
versions before 3.5.0 has a re
        NOT-FOR-US: PrestaShop
 CVE-2020-5276
        RESERVED
-CVE-2020-5275
-       RESERVED
-CVE-2020-5274
-       RESERVED
+CVE-2020-5275 [All "access_control" rules are required when a firewall uses 
the unanimous strategy]
+       - synfony <unfixed>
+       [buster] - symfony <not-affected> (Introduced in 4.4.0)
+       [stretch] - symfony <not-affected> (Introduced in 4.4.0)
+       NOTE: 
https://symfony.com/blog/cve-2020-5275-all-access-control-rules-are-required-when-a-firewall-uses-the-unanimous-strategy
+       NOTE: 
https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf
+CVE-2020-5274 [Fix Exception message escaping rendered by ErrorHandler]
+       - synfony <unfixed>
+       [buster] - symfony <not-affected> (Introduced in 4.4.0)
+       [stretch] - symfony <not-affected> (Introduced in 4.4.0)
+       NOTE: 
https://symfony.com/blog/cve-2020-5274-fix-exception-message-escaping-rendered-by-errorhandler
+       NOTE: 
https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad
+       NOTE: 
https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db
 CVE-2020-5273
        RESERVED
 CVE-2020-5272
@@ -13486,8 +13495,12 @@ CVE-2020-5257 (In Administrate (rubygem) before 
version 0.13.0, when sorting by
        NOT-FOR-US: Administrate ruby gem
 CVE-2020-5256 (BookStack before version 0.25.5 has a vulnerability where a 
user could ...)
        NOT-FOR-US: BookStack
-CVE-2020-5255
-       RESERVED
+CVE-2020-5255 [Prevent cache poisoning via a Response Content-Type header]
+       - synfony <unfixed>
+       [buster] - symfony <not-affected> (Introduced in 4.4.0)
+       [stretch] - symfony <not-affected> (Introduced in 4.4.0)
+       NOTE: 
https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header
+       NOTE: 
https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6
 CVE-2020-5254 (In NetHack before 3.6.6, some out-of-bound values for the 
hilite_statu ...)
        - nethack <unfixed> (bug #953978)
        [buster] - nethack <no-dsa> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2228b107eaff50f422c0d715a2569a3e983a653a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2228b107eaff50f422c0d715a2569a3e983a653a
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to