Upstream has issued an advisory on July 13: https://framework.zend.com/security/advisory/ZF2016-02 The issue is fixed in 1.12.19. More info is here: http://openwall.com/lists/oss-security/2016/07/16/1
CVE-2016-6233 has been assigned: http://openwall.com/lists/oss-security/2016/07/16/4
Summary: php-ZendFramework new security issue ZF2016-02 => php-ZendFramework new security issue ZF2016-02 (CVE-2016-6233)
1.12.19 release announcement: https://framework.zend.com/blog/2016-07-13-ZF-1.12.19-Released.html Note that ZF1 will be EOL in September: https://framework.zend.com/blog/2016-06-28-zf1-eol.html
Updated package uploaded for Mageia 5. Testing procedure: https://bugs.mageia.org/show_bug.cgi?id=13708#c3 Advisory: ======================== Updated php-ZendFramework packages fix security vulnerability: The implementation of ORDER BY and GROUP BY in Zend_Db_Select of ZendFramework is vulnerable to an SQL injection (CVE-2016-6233). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6233 https://framework.zend.com/security/advisory/ZF2016-02 https://framework.zend.com/blog/2016-07-13-ZF-1.12.19-Released.html ======================== Updated packages in core/updates_testing: ======================== php-ZendFramework-1.12.19-1.mga5 php-ZendFramework-demos-1.12.19-1.mga5 php-ZendFramework-tests-1.12.19-1.mga5 php-ZendFramework-extras-1.12.19-1.mga5 php-ZendFramework-Cache-Backend-Apc-1.12.19-1.mga5 php-ZendFramework-Cache-Backend-Memcached-1.12.19-1.mga5 php-ZendFramework-Captcha-1.12.19-1.mga5 php-ZendFramework-Dojo-1.12.19-1.mga5 php-ZendFramework-Feed-1.12.19-1.mga5 php-ZendFramework-Gdata-1.12.19-1.mga5 php-ZendFramework-Pdf-1.12.19-1.mga5 php-ZendFramework-Search-Lucene-1.12.19-1.mga5 php-ZendFramework-Services-1.12.19-1.mga5 from php-ZendFramework-1.12.19-1.mga5.src.rpm
Assignee: thomas => qa-bugsWhiteboard: (none) => has_procedure
installed all of the components successfully - now working on testing listed above.
CC: (none) => brtians1
followed Claire's instructions listed in https://bugs.mageia.org/show_bug.cgi?id=13708#c3 and was able to sign the guest book MGS5-32-ok.
Whiteboard: has_procedure => has_procedure mga5-32-ok
Keywords: (none) => validated_updateWhiteboard: has_procedure mga5-32-ok => has_procedure mga5-32-ok advisoryCC: (none) => davidwhodgins, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0272.html
Status: NEW => RESOLVEDResolution: (none) => FIXED
URL: (none) => http://lwn.net/Vulnerabilities/696219/