Skip to content
This repository was archived by the owner on Oct 2, 2019. It is now read-only.

Commit edb7534

Browse files
committed
Merge branch 'releases/1.12.8'
1.12.8 readiness
2 parents b7a3ee9 + 60754e7 commit edb7534

File tree

2 files changed

+20
-197
lines changed

2 files changed

+20
-197
lines changed

README.md

Lines changed: 19 additions & 196 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ Master: [![Build Status](https://api.travis-ci.org/zendframework/zf1.png?branch=
77
RELEASE INFORMATION
88
===================
99

10-
Zend Framework 1.12.8dev Release.
11-
Released on MMMMM DD, YYYY.
10+
Zend Framework 1.12.8 Release.
11+
Released on August 26, 2014.
1212

13-
IMPORTANT FIXES FOR 1.12.8dev
14-
-----------------------------
13+
IMPORTANT FIXES FOR 1.12.8
14+
--------------------------
1515

1616
- [#360](https://github.com/zendframework/zf1/pull/360) Zend_Locale:
1717
[CLDR](http://cldr.unicode.org) updated to version 25
@@ -20,198 +20,21 @@ IMPORTANT FIXES FOR 1.12.8dev
2020
- [#375](https://github.com/zendframework/zf1/pull/375) Implement
2121
Zend_Pdf::setJavascript(), Zend_Pdf::addJavascript() and
2222
Zend_Pdf::resetJavaScript()
23-
24-
SECURITY FIXES FOR 1.12.7
25-
-------------------------
26-
27-
- **ZF2014-04:** Potential SQL Injection (SQLi) attack via ORDER expessions:
28-
`Zend\Db\Select`'s `order()` method allwed passing function calls, but
29-
did not provide checks to prevent SQLi vectors. As an example:
30-
31-
```php
32-
$select = $db->select()->order('MD5(1); select...');
33-
```
34-
35-
could be entered.
36-
37-
If you use `Zend\Db\Select` with ORDER clauses, we strongly urge that you
38-
upgrade immediately.
39-
40-
IMPORTANT FIXES FOR 1.12.7
41-
--------------------------
42-
43-
- [#331](https://github.com/zendframework/zf1/pull/331) and
44-
[#376](https://github.com/zendframework/zf1/pull/376) provide support
45-
for PHPUnit 4 and 4.1, respectively, both within the Zend Framework test suite
46-
and inside the `Zend_Test_PHPUnit` component.
47-
- [#333](https://github.com/zendframework/zf1/pull/333) backports recursive
48-
page removal within `Zend_Navigation` from Zend Framework 2.
49-
- [#343](https://github.com/zendframework/zf1/pull/343) updates the `Hostname`
50-
validator to support the new IANA top level domains.
51-
- Forward-compatibility changes were made to ensure Zend Framework 1 will run on
52-
the upcoming PHP 5.6.
53-
54-
55-
IMPORTANT FIXES FOR 1.12.6
56-
--------------------------
57-
58-
- [#307](https://github.com/zendframework/zf1/pull/307) fixes a backwards
59-
compatibility break in the `Zend_Locale` component. 1.12.4 updated the
60-
[CLDR](http://cldr.unicode.org) version used by Zend Framework 1, which
61-
resulted in the removal of several locales we previously supported. The patch
62-
in #307 adds locale aliases for these to the new locales supported in recent
63-
versions of the CLDR, ensuring backwards compatibility for ZF1 users.
64-
65-
SECURITY FIXES FOR 1.12.4
66-
-------------------------
67-
68-
- **ZF2014-01:** Potential XXE/XEE attacks using PHP functions:
69-
`simplexml_load_*`, `DOMDocument::loadXML`, and `xml_parse`. A new component,
70-
`Zend_Xml`, was introduced to mitigate XML eXternal Entity and XML Entity
71-
Expansion vectors that are present in older versions of libxml2 and/or PHP.
72-
Components that could contain these vectors include:
73-
74-
- `Zend_Amf`
75-
- `Zend_Config`
76-
- `Zend_Dom`
77-
- `Zend_Feed`
78-
- `Zend_Gdata`
79-
- `Zend_Json`
80-
- `Zend_Locale`
81-
- `Zend_Mobile_Push`
82-
- `Zend_Rest_Client`
83-
- `Zend_Search_Lucene`
84-
- `Zend_Serializer_Adapter_Wddx`
85-
- `Zend_Service_Amazon`
86-
- `Zend_Service_AudioScrobbler`
87-
- `Zend_Service_Delicious`
88-
- `Zend_Service_Ebay`
89-
- `Zend_Service_Flickr`
90-
- `Zend_Service_SlideShare`
91-
- `Zend_Service_SqlAzure`
92-
- `Zend_Service_Technorati`
93-
- `Zend_Service_WindowsAzure`
94-
- `Zend_Service_Yahoo`
95-
- `Zend_Soap`
96-
- `Zend_Translate`
97-
98-
If you use one or more of these components, we strongly urge that you upgrade
99-
immediately.
100-
101-
- **ZF2014-02:** Potential security issue in login mechanism of `Zend_OpenId`
102-
consumer. Using the Consumer component in conjunction with a malicious OpenID
103-
provider, one could login to a service using an arbitrary OpenID Identity
104-
without requiring credentials, allowing impersonation of an OpenID Identity.
105-
If you use this component, we strongly urge that you upgrade immediately.
106-
107-
IMPORTANT FIXES FOR 1.12.4
108-
--------------------------
109-
110-
111-
- [#221](https://github.com/zendframework/zf1/pull/221) removes the TinySrc view
112-
helper, as the TinySrc service no longer exists.
113-
- [#222](https://github.com/zendframework/zf1/pull/222) removes the InfoCard
114-
component, as the CardSpace service no longer exists.
115-
- [#271](https://github.com/zendframework/zf1/pull/271) removes the Nirvanix
116-
component, as the Nirvanix service shut down in October 2013.
117-
118-
IMPORTANT FIXES FOR 1.12.3
119-
--------------------------
120-
121-
This release incorporates is primarily aimed to update
122-
Zend_Service_Twitter to the Twitter v1.1 API:
123-
124-
- http://framework.zend.com/issues/browse/ZF-12530
125-
126-
Because the Twitter v1.1 API is not backwards compatible with v1.0, the
127-
API for Zend_Service_Twitter has been changed; if you have been using it
128-
previously, you will need to update your code accordingly. Both the
129-
end-user and API documentation have been updated to reflect the changes.
130-
131-
IMPORTANT FIXES FOR 1.12.2
132-
--------------------------
133-
134-
This release incorporates over 40 bugfixes. In particular, the following
135-
issue has been resolved in Zend_Service_Twitter:
136-
137-
- http://framework.zend.com/issues/browse/ZF-9253
138-
139-
This fix ensures that Zend_Service_Twitter uses the new versioned API
140-
endpoint required by Twitter.
141-
142-
SECURITY FIXES FOR 1.12.1
143-
-------------------------
144-
145-
This release incorporates fixes for:
146-
147-
- http://framework.zend.com/security/advisory/ZF2012-05
148-
149-
Zend_Feed_Rss and Zend_Feed_Atom were found to contain XML eXternal
150-
Entity (XXE) Injection vectors due to insecure usage of the DOM
151-
extension. External entities could be specified by adding a specific
152-
DOCTYPE element to XML-RPC requests; exploiting this vulnerability could
153-
coerce opening arbitrary files and/or TCP connections.
154-
155-
A similar issue was fixed for 1.12.0, in the Zend_Feed::import() method;
156-
however, the reporter of the issue discovered that the individual
157-
classes contained similar functionality in their constructors which
158-
remained vulnerable.
159-
160-
The patch applied removes the XXE vector by calling
161-
libxml_disable_entity_loader() before attempting to parse the feed via
162-
DOMDocument::loadXML().
163-
164-
The above patches are also available in the 1.11 series of releases.
165-
166-
Thanks goes to Yury Dyachenko at Positive Research Center for for
167-
reporting the XXE vulnerability and reviewing the patches created to fix
168-
the issue.
169-
170-
SECURITY FIXES FOR 1.12.0
171-
-------------------------
172-
173-
This release incorporates fixes for each of:
174-
175-
- http://framework.zend.com/security/advisory/ZF2012-01
176-
- http://framework.zend.com/security/advisory/ZF2012-02
177-
178-
Several components were found to be vulnerable to XML eXternal Entity
179-
(XXE) Injection attacks due to insecure usage of the SimpleXMLElement
180-
class (SimpleXML PHP extension). External entities could be specified
181-
by adding a specific DOCTYPE element to XML-RPC requests; exploiting
182-
this vulnerability could coerce opening arbitrary files and/or TCP
183-
connections.
184-
185-
Additionally, these same components were found to be vulnerable to XML
186-
Entity Expansion (XEE) vectors. XEE attacks define custom entities
187-
within the DOCTYPE that refer to themselves, leading to recursion; the
188-
end result is excessive consumption of CPU and RAM, making Denial of
189-
Service (DoS) attacks easier to implement.
190-
191-
Vulnerable components included:
192-
193-
- Zend_Dom
194-
- Zend_Feed
195-
- Zend_Soap
196-
- Zend_XmlRpc
197-
198-
The patches applied do the following:
199-
200-
- To remove XXE vectors, libxml_disable_entity_loader() is called
201-
before any SimpleXML calls are executed.
202-
203-
- To remove XEE vectors, we loop through the DOMDocument child nodes,
204-
ensuring none are of type XML_DOCUMENT_TYPE_NODE, and raising an
205-
exception if any are. If SimpleXML is used, a DOMDocument is created
206-
first, processed as above, and then passed to simplexml_import_dom.
207-
208-
The above patches are also available in the 1.11 series of releases.
209-
210-
Thanks goes to Johannes Greil and Kestutis Gudinavicius of SEC-Consult
211-
for reporting the original XXE vulnerability against Zend_XmlRpc and
212-
working with us to provide a working solution. Thanks goes to Pádraic
213-
Brady for helping us identify other XXE vectors, as well as identifying
214-
and patching the XEE vectors.
23+
- [#414](https://github.com/zendframework/zf1/pull/414) Adds the
24+
`Microsoft_Console` component from the Windows Azure SDK for PHP into
25+
the `Zend_Service_Console` component, ensuring that WindowsAzure
26+
command line functionality included in the framework can now work.
27+
- [#385](https://github.com/zendframework/zf1/pull/385) Adds support for
28+
DateTime fractional seconds under PHP 5.6+.
29+
- [#382](https://github.com/zendframework/zf1/pull/382) Ensures that
30+
orphaned metadata cache files are removed when `Zend_Cache::CLEANING_MODE_ALL`
31+
is used.
32+
- [#410](https://github.com/zendframework/zf1/pull/410) Ensures that calls
33+
to reset the status of the libxml entity loader happen as soon as possible,
34+
to prevent potential threading issues under php-fpm (since the settings
35+
are per process, not per-request, in that environment).
36+
37+
See http://framework.zend.com/changelog/1.12.8 for full details.
21538

21639
NEW FEATURES
21740
============

library/Zend/Version.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ final class Zend_Version
3232
/**
3333
* Zend Framework version identification - see compareVersion()
3434
*/
35-
const VERSION = '1.12.8dev';
35+
const VERSION = '1.12.8';
3636

3737
/**
3838
* The latest stable version Zend Framework available

0 commit comments

Comments
 (0)