MGASA-2015-0391

Source
https://advisories.mageia.org/MGASA-2015-0391.html
Import Source
https://advisories.mageia.org/MGASA-2015-0391.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0391
Upstream
Published
2015-10-09T18:47:39Z
Modified
2026-04-16T06:25:12.306021136Z
Summary
Updated php-ZendFramework/php-ZendFramework2 packages fixe security vulnerabilities
Details

Zend Framework contained several instances where it was using incorrect permissions masks, which could lead to local privilege escalation issues (CVE-2015-5723).

The PDO adapters of Zend Framework 1 do not filter null bytes values in SQL statements. A PDO adapter can treat null bytes in a query as a string terminator, allowing an attacker to add arbitrary SQL following a null byte, and thus create a SQL injection (ZF2015-08).

Note that the ZF2015-08 issue did not affect Zend Framework 2.

References
Credits

Affected packages

Mageia:5 / php-ZendFramework

Package

Name
php-ZendFramework
Purl
pkg:rpm/mageia/php-ZendFramework?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.16-1.mga5

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2015-0391.json"

Mageia:5 / php-ZendFramework2

Package

Name
php-ZendFramework2
Purl
pkg:rpm/mageia/php-ZendFramework2?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.8-1.mga5

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2015-0391.json"