-------------------------------------------------------------------------
Debian LTS Advisory DLA-4200-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
May 31, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : symfony
Version : 4.4.19+dfsg-2+deb11u7
CVE ID : CVE-2024-50343 CVE-2024-50345
Security vulnerabilities were found in symfony, a PHP framework for web
and console applications and a set of reusable PHP components, which
could lead to validation bypass or open redirects.
CVE-2024-50343
It was discovered input ending with `\n` could bypass Validators.
CVE-2024-50345
Sam Mush discovered that due to URI parsing mismatch between common
browsers and the Request class, an attacker could supply a specially
crafted URI to bypass validation and redirect users to another
domain.
For Debian 11 bullseye, these problems have been fixed in version
4.4.19+dfsg-2+deb11u7.
We recommend that you upgrade your symfony packages.
For the detailed security status of symfony please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/symfony
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature