—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4441-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
May 10, 2019 https://www.debian.org/security/faq
– ————————————————————————-
Package : symfony
CVE ID : CVE-2018-14773 CVE-2018-19789 CVE-2018-19790 CVE-2019-10909
CVE-2019-10910 CVE-2019-10911 CVE-2019-10912 CVE-2019-10913
Multiple vulnerabilities were discovered in the Symfony PHP framework
which could lead to cache bypass, authentication bypass, information
disclosure, open redirect, cross-site request forgery, deletion of
arbitrary files, or arbitrary code execution.
For the stable distribution (stretch), these problems have been fixed in
version 2.8.7+dfsg-1.3+deb9u2.
We recommend that you upgrade your symfony packages.
For the detailed security status of symfony please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/symfony
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlzVGW0ACgkQEL6Jg/PV
nWR+Swf/XR9Ub4ALHbkYsZGArd1oOOr0nAWmI718ZyTNQGj9Hl5gl0NoNjRgkeD6
nY9a+H/6+aJSgVTugGbJ4CavJ0ecaHlBawdW+DvscTN3z9tqiE21/TpEaQWq95F9
o1sUhM5dlWkRwAHVPIuQyzrGJ3aLz+F4HBV7Z9WMU6AADHq/Q2AKysNXbxnvObsA
SUBWr5iExXxsXXE+ftZXde13frMIB4MZDYGkYO0FMV5333T9QiPWHr3g4S7Lvlir
D7IzOU3A1miIAafDdhCmDvTJMToL2dj4+coP1sQwUNz0WT5TDS0Tv8neJ5cUwEQO
RkaysBU+O9U0VxHrkhP3nRgvMuYVdQ==
=0n6N
—–END PGP SIGNATURE—–