CVE-2026-45756

NameCVE-2026-45756
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
symfony (PTS)bullseye4.4.19+dfsg-2+deb11u6fixed
bullseye (security)4.4.19+dfsg-2+deb11u7fixed
bookworm5.4.23+dfsg-1+deb12u5fixed
bookworm (security)5.4.23+dfsg-1+deb12u4fixed
trixie6.4.21+dfsg-2+deb13u1fixed
sid7.4.12+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
symfonysourcebullseye(not affected)
symfonysourcebookworm(not affected)
symfonysourcetrixie(not affected)
symfonysource(unstable)7.4.12+dfsg-1

Notes

[trixie] - symfony <not-affected> (Vulnerable code not present, introduced in 7.3)
[bookworm] - symfony <not-affected> (Vulnerable code not present, introduced in 7.3)
[bullseye] - symfony <not-affected> (Vulnerable code not present, introduced in 7.3)
https://symfony.com/blog/cve-2026-45756-jsonpath-evaluates-attacker-controlled-regular-expressions-in-match-search-without-limits-redos

Search for package or bug name: Reporting problems