| Summary: | php-ZendFramework new security issue ZF2016-02 (CVE-2016-6233) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | brtians1, davidwhodgins, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/696219/ | ||
| Whiteboard: | has_procedure mga5-32-ok advisory | ||
| Source RPM: | php-ZendFramework-1.12.18-1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-07-16 12:24:51 CEST
CVE-2016-6233 has been assigned: http://openwall.com/lists/oss-security/2016/07/16/4 Summary:
php-ZendFramework new security issue ZF2016-02 =>
php-ZendFramework new security issue ZF2016-02 (CVE-2016-6233) 1.12.19 release announcement: https://framework.zend.com/blog/2016-07-13-ZF-1.12.19-Released.html Note that ZF1 will be EOL in September: https://framework.zend.com/blog/2016-06-28-zf1-eol.html Updated package uploaded for Mageia 5. Testing procedure: https://bugs.mageia.org/show_bug.cgi?id=13708#c3 Advisory: ======================== Updated php-ZendFramework packages fix security vulnerability: The implementation of ORDER BY and GROUP BY in Zend_Db_Select of ZendFramework is vulnerable to an SQL injection (CVE-2016-6233). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6233 https://framework.zend.com/security/advisory/ZF2016-02 https://framework.zend.com/blog/2016-07-13-ZF-1.12.19-Released.html ======================== Updated packages in core/updates_testing: ======================== php-ZendFramework-1.12.19-1.mga5 php-ZendFramework-demos-1.12.19-1.mga5 php-ZendFramework-tests-1.12.19-1.mga5 php-ZendFramework-extras-1.12.19-1.mga5 php-ZendFramework-Cache-Backend-Apc-1.12.19-1.mga5 php-ZendFramework-Cache-Backend-Memcached-1.12.19-1.mga5 php-ZendFramework-Captcha-1.12.19-1.mga5 php-ZendFramework-Dojo-1.12.19-1.mga5 php-ZendFramework-Feed-1.12.19-1.mga5 php-ZendFramework-Gdata-1.12.19-1.mga5 php-ZendFramework-Pdf-1.12.19-1.mga5 php-ZendFramework-Search-Lucene-1.12.19-1.mga5 php-ZendFramework-Services-1.12.19-1.mga5 from php-ZendFramework-1.12.19-1.mga5.src.rpm Assignee:
thomas =>
qa-bugs installed all of the components successfully - now working on testing listed above. CC:
(none) =>
brtians1 followed Claire's instructions listed in https://bugs.mageia.org/show_bug.cgi?id=13708#c3 and was able to sign the guest book MGS5-32-ok. Whiteboard:
has_procedure =>
has_procedure mga5-32-ok
Dave Hodgins
2016-08-03 06:33:23 CEST
Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0272.html Status:
NEW =>
RESOLVED
David Walser
2016-08-08 21:33:05 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/696219/ |