------------------------------------------------------------------------- Debian LTS Advisory DLA-4200-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Guilhem Moulin May 31, 2025 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : symfony Version : 4.4.19+dfsg-2+deb11u7 CVE ID : CVE-2024-50343 CVE-2024-50345 Security vulnerabilities were found in symfony, a PHP framework for web and console applications and a set of reusable PHP components, which could lead to validation bypass or open redirects. CVE-2024-50343 It was discovered input ending with `\n` could bypass Validators. CVE-2024-50345 Sam Mush discovered that due to URI parsing mismatch between common browsers and the Request class, an attacker could supply a specially crafted URI to bypass validation and redirect users to another domain. For Debian 11 bullseye, these problems have been fixed in version 4.4.19+dfsg-2+deb11u7. We recommend that you upgrade your symfony packages. For the detailed security status of symfony please refer to its security tracker page at: https://security-tracker.debian.org/tracker/symfony Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature