Summary: | <dev-php/ZendFramework-1.11.6: Filter bypass may allow SQL injection (CVE-2011-1939) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | alexanderyt, gurligebis, php-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://framework.zend.com/security/advisory/ZF2011-02 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
2011-05-29 04:01:35 UTC
Do fell free to bump and stabilize the new version :) Would make me happy to be able to get rid of the old versions, once the new version is stable :) (So that would be a bonus) Ebuild committed. Please go ahead and stabilise. Cheers! (In reply to comment #2) > Ebuild committed. Please go ahead and stabilise. > Thanks! Arches, please test and mark stable: =dev-php/ZendFramework-1.11.6 Target keywords : "amd64 hppa ppc ppc64 x86" amd64 done Stable for HPPA. Tested on x86, looks also good here. x86 stable, thanks Andreas ppc done ppc64 stable, last arch done Thanks, folks. GLSA Vote: Yes. Vote: YES. New GLSA request filed. This issue was resolved and addressed in GLSA 201408-01 at http://security.gentoo.org/glsa/glsa-201408-01.xml by GLSA coordinator Sergey Popov (pinkbyte). |