CVE-2019-18887

NameCVE-2019-18887
DescriptionAn issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1999-1, DSA-4573-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
symfony (PTS)stretch (security), stretch2.8.7+dfsg-1.3+deb9u3fixed
buster, buster (security)3.4.22+dfsg-2+deb10u1fixed
bookworm, sid, bullseye4.4.19+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
symfonysourcejessie2.3.21+dfsg-4+deb8u6DLA-1999-1
symfonysourcestretch2.8.7+dfsg-1.3+deb9u3DSA-4573-1
symfonysourcebuster3.4.22+dfsg-2+deb10u1DSA-4573-1
symfonysource(unstable)4.3.8+dfsg-1

Notes

https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner
https://github.com/symfony/symfony/commit/cccefe6a7f12e776df0665aeb77fe9294c285fbb

Search for package or bug name: Reporting problems