Skip to content
This repository was archived by the owner on May 16, 2018. It is now read-only.

Conversation

@bencromwell
Copy link

I find this useful in my IDE (at some point someone had tried to call $log->error instead of $log->err). This change simply highlights those issues in decent editors.

@froschdesign
Copy link
Member

@bencromwell
Sorry, but I can not found a signed CLA.

@bencromwell
Copy link
Author

@froschdesign sorry about that, I will get a completed CLA off ASAP.

@froschdesign
Copy link
Member

@bencromwell
The problem is already fixed: @f842f8970edd1e5f93a37310c6abb2c7fa32f7ce

@froschdesign froschdesign added this to the 1.12.16 milestone Aug 19, 2015
dsikkema-magento pushed a commit to magento/zf1 that referenced this pull request Sep 30, 2015
Zend Framework 1.12.16

- [504: Cannot parse huge documents in Zend&zendframework#95;Dom&zendframework#95;Query](zendframework#504)
- [599: Wrong return type in DocBlock of Zend&zendframework#95;Console&zendframework#95;Getopt::getOption()](zendframework#599)
- [600: Undefined property $config in Zend&zendframework#95;Http&zendframework#95;Client&zendframework#95;Adapter&zendframework#95;Curl](zendframework#600)
- [604: add doccomments to Zend&zendframework#95;Log covering its magic methods](zendframework#604)
- [606: Fix typo in Zend&zendframework#95;Cache-Backends documentation.](zendframework#606)
- [610: Add ß (Latin small letter sharp s) to .de domain IDNA check](zendframework#610)
- [612: Zend&zendframework#95;Validate&zendframework#95;Hostname does not validate NTP hostnames starting with '0' character](zendframework#612)

SECURITY UPDATES
----------------

- **ZF2015-07**: A number of components, including `Zend_Cloud`, `Zend_Search_Lucene`, and `Zend_Service_WindowsAzure` were creating directories with a liberal umask that could lead to local arbitrary code execution and/or local privilege escalation. This release contains a patch that ensures the directories are created using permissions of 0775 and files using 0664 (essentially umask 0002).

- **ZF2015-08**: ZF2014-06 uncovered an issue in the sqlsrv adapter provided by the framework whereby null bytes were not filtered correctly when generating SQL. A reporter discovered the same vulnerability is present in our PDO implementation when used with pdo_dblib, and could potentially be applied to other PDO adapters.  This release contains a patch to properly escape null bytes used in SQL queries across all PDO adapters shipped with the framework.

Conflicts:
	README.md
tavy315 added a commit to tavy315/zendframework1 that referenced this pull request Oct 20, 2015
dgiotas pushed a commit to tripsta/zf1 that referenced this pull request Jun 17, 2016
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants