blob: 5896ff81bae90fec4f4f16b93952fb66ee0dcebd [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201405-25">
<title>Symfony: Information disclosure</title>
<synopsis>A vulnerability in Symfony may allow remote attackers to read
arbitrary files.
<product type="ebuild">symfony</product>
<announced>May 18, 2014</announced>
<revised>May 18, 2014: 1</revised>
<package name="dev-php/symfony" auto="yes" arch="*">
<vulnerable range="lt">1.4.20</vulnerable>
<p>Symfony is a professional, open-source PHP5 web development framework.</p>
<p>Symfony does not properly sanitize input for upload requests.</p>
<impact type="low">
<p>A remote attacker could send a specially crafted file upload request,
possibly resulting in disclosure of sensitive information.
<p>There is no known workaround at this time.</p>
<p>Gentoo has discontinued support for Symfony. We recommend that users
unmerge Symfony:
# emerge --unmerge "dev-php/symfony"
<uri link="">CVE-2012-5574</uri>
<metadata tag="requester" timestamp="Mon, 17 Dec 2012 03:37:50 +0000">
<metadata tag="submitter" timestamp="Sun, 18 May 2014 17:31:18 +0000">ackle</metadata>