[SECURITY] [DLA 1707-1] symfony security update

2019-03-09 Thread Roberto C . Sánchez
Package: symfony
Version: 2.3.21+dfsg-4+deb8u4
CVE ID : CVE-2017-16652 CVE-2017-16654 CVE-2018-11385 CVE-2018-11408 
 CVE-2018-14773 CVE-2018-19789 CVE-2018-19790


Several security vulnerabilities have been discovered in symfony, a PHP
web application framework.  Numerous symfony components are affected:
Security, bundle readers, session handling, SecurityBundle,
HttpFoundation, Form, and Security\Http.

The corresponding upstream advisories contain further details:

[CVE-2017-16652]
https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers

[CVE-2017-16654]
https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths

[CVE-2018-11385]
https://symfony.com/blog/cve-2018-11385-session-fixation-issue-for-guard-authentication

[CVE-2018-11408]
https://symfony.com/blog/cve-2018-11408-open-redirect-vulnerability-on-security-handlers

[CVE-2018-14773]
https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and-risky-http-headers

[CVE-2018-19789]
https://symfony.com/blog/cve-2018-19789-disclosure-of-uploaded-files-full-path

[CVE-2018-19790]
https://symfony.com/blog/cve-2018-19790-open-redirect-vulnerability-when-using-security-http

For Debian 8 "Jessie", these problems have been fixed in version
2.3.21+dfsg-4+deb8u4.

We recommend that you upgrade your symfony packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


signature.asc
Description: PGP signature


Accepted symfony 2.3.21+dfsg-4+deb8u4 (source all) into oldstable

2019-03-09 Thread Roberto C. Sanchez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 01 Mar 2019 09:20:42 -0500
Source: symfony
Binary: php-symfony-browser-kit php-symfony-class-loader 
php-symfony-classloader php-symfony-config php-symfony-console 
php-symfony-css-selector php-symfony-debug php-symfony-dependency-injection 
php-symfony-dom-crawler php-symfony-event-dispatcher 
php-symfony-eventdispatcher php-symfony-filesystem php-symfony-finder 
php-symfony-form php-symfony-http-foundation php-symfony-http-kernel 
php-symfony-intl php-symfony-locale php-symfony-options-resolver 
php-symfony-process php-symfony-property-access php-symfony-routing 
php-symfony-security php-symfony-serializer php-symfony-stopwatch 
php-symfony-templating php-symfony-translation php-symfony-validator 
php-symfony-yaml php-symfony-doctrine-bridge php-symfony-monolog-bridge 
php-symfony-propel1-bridge php-symfony-proxy-manager-bridge 
php-symfony-swiftmailer-bridge php-symfony-twig-bridge 
php-symfony-framework-bundle php-symfony-security-bundle 
php-symfony-twig-bundle php-symfony-web-profiler-bundle
Architecture: source all
Version: 2.3.21+dfsg-4+deb8u4
Distribution: jessie-security
Urgency: high
Maintainer: Debian PHP PEAR Maintainers 
Changed-By: Roberto C. Sanchez 
Description:
 php-symfony-browser-kit - simulate the behavior of a web browser
 php-symfony-class-loader - load PHP classes automatically
 php-symfony-classloader - transitional dummy package
 php-symfony-config - load configurations from different data sources
 php-symfony-console - run tasks from the command line
 php-symfony-css-selector - convert CSS selectors to XPath expressions
 php-symfony-debug - tools to make debugging of PHP code easier
 php-symfony-dependency-injection - standardize and centralize construction of 
objects
 php-symfony-doctrine-bridge - integration for Doctrine with Symfony Components
 php-symfony-dom-crawler - ease DOM navigation for HTML and XML documents
 php-symfony-event-dispatcher - dispatch events and listen to them
 php-symfony-eventdispatcher - transitional dummy package
 php-symfony-filesystem - basic filesystem utilities
 php-symfony-finder - find files and directories
 php-symfony-form - create HTML forms and process request data
 php-symfony-framework-bundle - basic, robust and flexible MVC framework
 php-symfony-http-foundation - object-oriented layer for the HTTP specification
 php-symfony-http-kernel - building blocks for flexible and fast HTTP-based 
frameworks
 php-symfony-intl - limited replacement layer for the PHP extension intl
 php-symfony-locale - deprecated replacement layer for the PHP extension intl
 php-symfony-monolog-bridge - integration for Monolog with Symfony Components
 php-symfony-options-resolver - configure objects with option arrays
 php-symfony-process - execute commands in sub-processes
 php-symfony-propel1-bridge - integration for Propel with Symfony Components
 php-symfony-property-access - read from and write to an object or array
 php-symfony-proxy-manager-bridge - integration for ProxyManager with Symfony 
Components
 php-symfony-routing - associate a request with code that generates a response
 php-symfony-security - infrastructure for sophisticated authorization systems
 php-symfony-security-bundle - configurable security system for the Symfony 
framework
 php-symfony-serializer - convert PHP objects into specific formats and vice 
versa
 php-symfony-stopwatch - profile PHP code
 php-symfony-swiftmailer-bridge - integration for Swift Mailer with Symfony 
Components
 php-symfony-templating - tools needed to build a template system
 php-symfony-translation - tools to internationalize an application
 php-symfony-twig-bridge - integration for Twig with Symfony Components
 php-symfony-twig-bundle - configurable integration of Twig with the Symfony 
framework
 php-symfony-validator - tools to validate classes
 php-symfony-web-profiler-bundle - collect requests information for analysis 
and debugging
 php-symfony-yaml - convert YAML to PHP arrays and the other way around
Changes:
 symfony (2.3.21+dfsg-4+deb8u4) jessie-security; urgency=high
 .
   * Non-maintainer upload by the LTS Team.
   * Cherry-pick upstream commit to fix unit test regression caused by PHP
 5.6.27 (specifically, the fix for PHP bug 72972)
   * Fix additional unit test failures resulting from dates too far in the past
   * Cherry-pick upstream commits to fix security issues
 + Fix CVE-2017-16652: [Security] Validate redirect targets using the
   session cookie domain
 + Fix CVE-2017-16654: prevent bundle readers from breaking out of paths
 + Fix CVE-2018-11385: Adding session strategy to ALL listeners to avoid
   *any* possible fixation
 + Fix CVE-2018-11408: [SecurityBundle] Fail if security.http_utils cannot
   be configured
 + Fix CVE-2018-14773: [HttpFoundation] Remove support for legacy and risky
   HTTP headers
 + Fix CVE-2018-19789: [Form] Filter file uploads out of regular form types
  

Re: Bug#924060: systemd: Memory leak introduced with CVE-2018-16864 fix

2019-03-09 Thread Michael Biebl
Control: notfound -1 232-25+deb9u9
Control: notfound -1 241-1

Hi Will

Am 09.03.19 um 00:14 schrieb Will Roberts:
> Package: systemd
> Version: 215-17+deb8u10
> Severity: important
> Tags: patch
> 
> Dear Maintainer,
> 
> The fix for CVE-2018-16864 contains a memory leak that was fixed for
> newer distributions of Debian, but not old-stable. I believe this commit 
> contains
> the changes that need to be applied:
> 
> https://salsa.debian.org/systemd-team/systemd/commit/d9c31850e7bfbb537c7fdc81ad9a9fc96a1fd33e

old-stable uploads are generally handled by the LTS team (who also made
this particular upload).
Bringing them into the loop here.

stable and testing/unstable are not affected afaics, so marking accordingly

Regards,
Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: Debian/LTS newbie question

2019-03-09 Thread th.pitsc...@uni.de
Amend (self-answer):

Answers to some of my questions are found in

https://debian-handbook.info/browse/stable/sect.release-lifecycle.html#id-1.4.9.15

(section "Lifecycle of a Release")



Re: Debian/LTS newbie question

2019-03-09 Thread Sylvain Beucler
Hi,

On 09/03/2019 11:44, th.pitsc...@uni.de wrote:
> Hello list members,
>
> is it correct to assume that in Debian versions entering "obsolete"
> state, any "aptitude safe-upgrade" will stop upgrading to newer
> packages other than for the reason of security fixes?
>
> When exactly would also the security related upgrades stop?
>
> In other words: what are the exact assertions given by the specific
> release states "stable", "oldstable", "obsolete" with regards to
> packet upgrades? (when the system is left "as is"; i.e. no adjustment
> to the /etc/apt/sources.list)
>
> I searched the general Debian Release info pages, but could not find a
> definite answer.

Actually "stable" is frozen, and only offers security updates
(responsively) and major bug fixes (every few months).
When it becomes "oldstable"/"obsolete stable" it gets fewer support over
time, see the details and dates at:
https://wiki.debian.org/DebianReleases
https://wiki.debian.org/LTS
https://wiki.debian.org/LTS/Extended

Cheers!
Sylvain



Debian/LTS newbie question

2019-03-09 Thread th.pitsc...@uni.de
Hello list members,

is it correct to assume that in Debian versions entering "obsolete"
state, any "aptitude safe-upgrade" will stop upgrading to newer
packages other than for the reason of security fixes?

When exactly would also the security related upgrades stop?

In other words: what are the exact assertions given by the specific
release states "stable", "oldstable", "obsolete" with regards to
packet upgrades? (when the system is left "as is"; i.e. no adjustment
to the /etc/apt/sources.list)

I searched the general Debian Release info pages, but could not find a
definite answer.

Thanks in advance,
Tom