These upstream advisories are from August and December. ZF2012-05 (fixed in 1.11.15 and 1.12.1) has CVE-2012-5657: http://openwall.com/lists/oss-security/2012/12/20/4 It doesn't appear a CVE was ever requested for ZF2012-02 (fixed in 1.11.13). ZF2012-02 was also fixed in 1.12.0, so doesn't affect Cauldron. Both affect Mageia 2. ZF2012-3 and ZF2012-4 only affect versions 2.x. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5657 http://framework.zend.com/security/advisory/ZF2012-02 http://framework.zend.com/security/advisory/ZF2012-05
CC: (none) => thomasWhiteboard: (none) => MGA2TOO
Assignee: bugsquad => thomas
Status: NEW => ASSIGNED
This bug has been fixed in mga2 by upgrading to 1.12.1 as recommended at the Zend Website and uploaded to upgrade_testing. I haven't done any testing because I don't have any means to do the testing.
Assignee: thomas => qa-bugs
Zend quickstart intro: http://framework.zend.com/manual/1.12/en/learning.quickstart.intro.html
Thomas, the one in updates_testing has a subrel, so it's newer than the one in Cauldron. Either it needs to be deleted by a sysadmin and resubmitted without the subrel, or rebuilt in Cauldron.
Packages built: php-ZendFramework-1.12.1-1.1.mga2 php-ZendFramework-demos-1.12.1-1.1.mga2 php-ZendFramework-tests-1.12.1-1.1.mga2 php-ZendFramework-extras-1.12.1-1.1.mga2 php-ZendFramework-Cache-Backend-Apc-1.12.1-1.1.mga2 php-ZendFramework-Cache-Backend-Memcached-1.12.1-1.1.mga2 php-ZendFramework-Captcha-1.12.1-1.1.mga2 php-ZendFramework-Dojo-1.12.1-1.1.mga2 php-ZendFramework-Feed-1.12.1-1.1.mga2 php-ZendFramework-Gdata-1.12.1-1.1.mga2 php-ZendFramework-Pdf-1.12.1-1.1.mga2 php-ZendFramework-Search-Lucene-1.12.1-1.1.mga2 php-ZendFramework-Services-1.12.1-1.1.mga2 from php-ZendFramework-1.12.1-1.1.mga2.src.rpm
Version: Cauldron => 2Whiteboard: MGA2TOO => feedback
Useful looking: http://www.webhostinghub.com/support/website/general-server-setup/test-zend-framework-installation
(In reply to comment #4) > Packages built: > php-ZendFramework-1.12.1-1.1.mga2 > php-ZendFramework-demos-1.12.1-1.1.mga2 > php-ZendFramework-tests-1.12.1-1.1.mga2 > php-ZendFramework-extras-1.12.1-1.1.mga2 > php-ZendFramework-Cache-Backend-Apc-1.12.1-1.1.mga2 > php-ZendFramework-Cache-Backend-Memcached-1.12.1-1.1.mga2 > php-ZendFramework-Captcha-1.12.1-1.1.mga2 > php-ZendFramework-Dojo-1.12.1-1.1.mga2 > php-ZendFramework-Feed-1.12.1-1.1.mga2 > php-ZendFramework-Gdata-1.12.1-1.1.mga2 > php-ZendFramework-Pdf-1.12.1-1.1.mga2 > php-ZendFramework-Search-Lucene-1.12.1-1.1.mga2 > php-ZendFramework-Services-1.12.1-1.1.mga2 > > from php-ZendFramework-1.12.1-1.1.mga2.src.rpm I expected to have another upgrade soon. But I just bumped the rel.
Thanks Thomas. I'll post an advisory in the morning.
Whiteboard: feedback => (none)
Advisory: ======================== Updated php-ZendFramework packages fix security vulnerabilities: Zend_Dom, Zend_Feed, Zend_Soap, and Zend_XmlRpc in Zend Framework before 1.11.13 and 1.12.0 are vulnerable to XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement (ZF2012-02). A vulnerability was reported in Zend Framework versions prior to 1.11.15 and 1.12.1, which can be exploited to disclose certain sensitive information. This flaw is caused due to an error in the "Zend_Feed_Rss" and "Zend_Feed_Atom" classes of the "Zend_Feed" component, when processing XML data. It can be used to disclose the contents of certain local files by sending specially crafted XML data including external entity references (CVE-2012-5657, ZF2012-05). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5657 http://openwall.com/lists/oss-security/2012/12/20/2 http://framework.zend.com/security/advisory/ZF2012-02 http://framework.zend.com/security/advisory/ZF2012-05 ======================== Updated packages in core/updates_testing: ======================== php-ZendFramework-1.12.1-1.1.mga2 php-ZendFramework-demos-1.12.1-1.1.mga2 php-ZendFramework-tests-1.12.1-1.1.mga2 php-ZendFramework-extras-1.12.1-1.1.mga2 php-ZendFramework-Cache-Backend-Apc-1.12.1-1.1.mga2 php-ZendFramework-Cache-Backend-Memcached-1.12.1-1.1.mga2 php-ZendFramework-Captcha-1.12.1-1.1.mga2 php-ZendFramework-Dojo-1.12.1-1.1.mga2 php-ZendFramework-Feed-1.12.1-1.1.mga2 php-ZendFramework-Gdata-1.12.1-1.1.mga2 php-ZendFramework-Pdf-1.12.1-1.1.mga2 php-ZendFramework-Search-Lucene-1.12.1-1.1.mga2 php-ZendFramework-Services-1.12.1-1.1.mga2 from php-ZendFramework-1.12.1-1.1.mga2.src.rpm
Testing complete on Mageia 2 i586 and x86-64 using the procedure at https://bugs.mageia.org/show_bug.cgi?id=6666#c16 Only testing for regressions. Could someone from the sysadmin team push the srpm php-ZendFramework-1.12.1-1.1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated php-ZendFramework packages fix security vulnerabilities: Zend_Dom, Zend_Feed, Zend_Soap, and Zend_XmlRpc in Zend Framework before 1.11.13 and 1.12.0 are vulnerable to XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement (ZF2012-02). A vulnerability was reported in Zend Framework versions prior to 1.11.15 and 1.12.1, which can be exploited to disclose certain sensitive information. This flaw is caused due to an error in the "Zend_Feed_Rss" and "Zend_Feed_Atom" classes of the "Zend_Feed" component, when processing XML data. It can be used to disclose the contents of certain local files by sending specially crafted XML data including external entity references (CVE-2012-5657, ZF2012-05). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5657 http://openwall.com/lists/oss-security/2012/12/20/2 http://framework.zend.com/security/advisory/ZF2012-02 http://framework.zend.com/security/advisory/ZF2012-05 https://bugs.mageia.org/show_bug.cgi?id=8456
Keywords: (none) => validated_updateCC: (none) => davidwhodgins, sysadmin-bugsWhiteboard: (none) => MGA2-64-OK MGA2-32-OK
Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0367
Status: ASSIGNED => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED
URL: (none) => http://lwn.net/Vulnerabilities/530909/
Update checked into Mageia 1 SVN.