Bug 15994 - php-ZendFramework, php-ZendFramework2 new security issue ZF2015-04 (CVE-2015-3154)
Summary: php-ZendFramework, php-ZendFramework2 new security issue ZF2015-04 (CVE-2015-...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/645240/
Whiteboard: has_procedure advisory MGA4-32-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-05-20 18:30 CEST by David Walser
Modified: 2015-06-08 23:18 CEST (History)
4 users (show)

See Also:
Source RPM: php-ZendFramework, php-ZendFramework2
CVE:
Status comment:


Attachments

Description David Walser 2015-05-20 18:30:58 CEST
Upstream has issued an advisory on May 7:
http://framework.zend.com/security/advisory/ZF2015-04

The issue is fixed upstream in 1.2.12 and 2.3.8.  2.3.9 fixed a regression:
http://framework.zend.com/blog/zend-framework-1-12-12-released.html
http://framework.zend.com/blog/zend-framework-2-3-8-and-2-4-1-released.html
http://framework.zend.com/blog/zend-framework-2-3-9-and-2-4-2-released.html

Reproducible: 

Steps to Reproduce:
David Walser 2015-05-20 18:31:11 CEST

CC: (none) => guillomovitch, oe
Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 David Walser 2015-05-20 18:31:32 CEST
Fedora has issued an advisory for this on May 10:
https://lists.fedoraproject.org/pipermail/package-announce/2015-May/158262.html
Comment 2 David Walser 2015-05-20 18:49:53 CEST
Debian has also issued an advisory for this (for ZF1) today:
https://lists.debian.org/debian-security-announce/2015/msg00155.html

The DSA will be posted here:
https://www.debian.org/security/2015/dsa-3265

Only the CVE-2015-3154 is still relevant for us; we fixed the others in previous updates.

URL: (none) => http://lwn.net/Vulnerabilities/645240/

Comment 3 David Walser 2015-05-21 18:30:12 CEST
1.2.13 has also been released fixing a regression:
http://framework.zend.com/blog/zend-framework-1-12-13-released.html
Comment 4 David Walser 2015-05-21 18:33:58 CEST
Checked into Cauldron SVN.  Freeze push requested.
Comment 5 David Walser 2015-05-22 18:09:40 CEST
Updated packages uploaded for Mageia 4 and Cauldron.

Testing procedure:
https://bugs.mageia.org/show_bug.cgi?id=13708#c3

Advisory:
========================

Updated php-ZendFramework packages fix security vulnerability:

Filippo Tessarotto and Maks3w reported potential CRLF injection attacks in
mail and HTTP headers in ZendFramework before 1.2.12 (CVE-2015-3154).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3154
http://framework.zend.com/security/advisory/ZF2015-04
http://framework.zend.com/blog/zend-framework-1-12-10-released.html
http://framework.zend.com/blog/zend-framework-1-12-11-released.html
http://framework.zend.com/blog/zend-framework-1-12-12-released.html
http://framework.zend.com/blog/zend-framework-1-12-13-released.html
https://www.debian.org/security/2015/dsa-3265
========================

Updated packages in core/updates_testing:
========================
php-ZendFramework-1.12.13-1.mga4
php-ZendFramework-demos-1.12.13-1.mga4
php-ZendFramework-tests-1.12.13-1.mga4
php-ZendFramework-extras-1.12.13-1.mga4
php-ZendFramework-Cache-Backend-Apc-1.12.13-1.mga4
php-ZendFramework-Cache-Backend-Memcached-1.12.13-1.mga4
php-ZendFramework-Captcha-1.12.13-1.mga4
php-ZendFramework-Dojo-1.12.13-1.mga4
php-ZendFramework-Feed-1.12.13-1.mga4
php-ZendFramework-Gdata-1.12.13-1.mga4
php-ZendFramework-Pdf-1.12.13-1.mga4
php-ZendFramework-Search-Lucene-1.12.13-1.mga4
php-ZendFramework-Services-1.12.13-1.mga4

from php-ZendFramework-1.12.13-1.mga4.src.rpm

CC: guillomovitch => thomas
Version: Cauldron => 4
Assignee: thomas => qa-bugs
Whiteboard: MGA5TOO, MGA4TOO => has_procedure

Comment 6 Herman Viaene 2015-06-05 14:23:19 CEST
MGA4-32 on AcerD620 Xfce
No installation issues.
Followed procedure as per bug6666 Comment16, works OK

CC: (none) => herman.viaene
Whiteboard: has_procedure => has_procedure MGA4-32-OK

Comment 7 Herman Viaene 2015-06-05 15:04:30 CEST
MGA4-64 on HP-Probook 6555b
No installation issues.
Followed exactly the same as above. Got into http://127.0.0.1/Zend/public/index.php OK, but cliking on the Guestbook link gives: 
An error occurred
Application error
At least the packages install well, and the application starts, is the rest an issue for us?
Comment 8 Herman Viaene 2015-06-05 15:29:03 CEST
Tested again on MGA4-64 on HP-Probook 6555b with older version 1.12.3, that works OK.
Comment 9 Herman Viaene 2015-06-05 15:47:55 CEST
Now installed 1.12.13 over existing 1.12.3, and now the testcase does not throw any errors anymore.
Comment 10 Herman Viaene 2015-06-05 16:03:56 CEST
from /var/log/httpd/error_log:
[Fri Jun 05 15:27:43.143967 2015] [:error] [pid 25683] [client 127.0.0.1:55209] PHP Warning:  date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/html/Zend/application/models/GuestbookMapper.php on line 32, referer: http://127.0.0.1/Zend/public/index.php/guestbook/sign
That is th etime the first test failed.
No errors from test of previous version or from second test of the update.
Comment 11 David Walser 2015-06-05 16:05:58 CEST
You need to set date.timezone in /etc/php.ini.
Herman Viaene 2015-06-05 16:14:58 CEST

Whiteboard: has_procedure MGA4-32-OK => has_procedure MGA4-32-OK MGA4-64-OK

Comment 12 claire robinson 2015-06-05 19:36:03 CEST
Validating. Advisory uploaded.

Please push to 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK => has_procedure advisory MGA4-32-OK MGA4-64-OK
CC: (none) => sysadmin-bugs

Comment 13 Mageia Robot 2015-06-08 23:18:42 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0241.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.