lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20180803163258.GB10528@pisco.westfalen.local>
Date: Fri, 3 Aug 2018 18:32:58 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4262-1] symfony security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4262-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 03, 2018                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : symfony
CVE ID         : CVE-2016-2403  CVE-2017-1665  CVE-2017-16653
                 CVE-2017-16654 CVE-2017-16790 CVE-2018-11385
		 CVE-2018-11386 CVE-2018-11406

Multiple vulnerabilities have been found in the Symfony PHP framework
which could lead to open redirects, cross-site request forgery,
information disclosure, session fixation or denial of service.

For the stable distribution (stretch), these problems have been fixed in
version 2.8.7+dfsg-1.3+deb9u1.

We recommend that you upgrade your symfony packages.

For the detailed security status of symfony please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/symfony

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=kGXi
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ