Browse Source

Bump release version to 1.12.1

git-svn-id: http://framework.zend.com/svn/framework/standard/branches/release-1.12@25161 44c647ce-9c0f-0410-b52a-842ac1e357ba
matthew 13 năm trước cách đây
mục cha
commit
8625a23cbd
2 tập tin đã thay đổi với 20 bổ sung38 xóa
  1. 19 37
      README.txt
  2. 1 1
      library/Zend/Version.php

+ 19 - 37
README.txt

@@ -2,54 +2,36 @@ Welcome to the Zend Framework 1.12 Release!
 
 RELEASE INFORMATION
 ---------------
-Zend Framework 1.12.0 Release ([INSERT REV NUM HERE]).
+Zend Framework 1.12.1 Release ([INSERT REV NUM HERE]).
 Released on <Month> <Day>, <Year>.
 
-SECURITY FIXES FOR 1.12.0
+SECURITY FIXES FOR 1.12.1
 -------------------------
 
-This release incorporates fixes for each of:
+This release incorporates fixes for:
 
- - http://framework.zend.com/security/advisory/ZF2012-01
- - http://framework.zend.com/security/advisory/ZF2012-02
+ - http://framework.zend.com/security/advisory/ZF2012-05
 
-Several components were found to be vulnerable to XML eXternal Entity
-(XXE) Injection attacks due to insecure usage of the SimpleXMLElement
-class (SimpleXML PHP extension).  External entities could be specified
-by adding a specific DOCTYPE element to XML-RPC requests; exploiting
-this vulnerability could coerce opening arbitrary files and/or TCP
-connections.
+Zend_Feed_Rss and Zend_Feed_Atom were found to contain XML eXternal
+Entity (XXE) Injection vectors due to insecure usage of the DOM
+extension.  External entities could be specified by adding a specific
+DOCTYPE element to XML-RPC requests; exploiting this vulnerability could
+coerce opening arbitrary files and/or TCP connections.
 
-Additionally, these same components were found to be vulnerable to XML
-Entity Expansion (XEE) vectors. XEE attacks define custom entities
-within the DOCTYPE that refer to themselves, leading to recursion; the
-end result is excessive consumption of CPU and RAM, making Denial of
-Service (DoS) attacks easier to implement.
+A similar issue was fixed for 1.12.0, in the Zend_Feed::import() method;
+however, the reporter of the issue discovered that the individual
+classes contained similar functionality in their constructors which
+remained vulnerable.
 
-Vulnerable components included:
-
- - Zend_Dom
- - Zend_Feed
- - Zend_Soap
- - Zend_XmlRpc
-
-The patches applied do the following:
-
- - To remove XXE vectors, libxml_disable_entity_loader() is called
-   before any SimpleXML calls are executed.
-
- - To remove XEE vectors, we loop through the DOMDocument child nodes,
-   ensuring none are of type XML_DOCUMENT_TYPE_NODE, and raising an
-   exception if any are. If SimpleXML is used, a DOMDocument is created
-   first, processed as above, and then passed to simplexml_import_dom.
+The patch applied removes the XXE vector by calling
+libxml_disable_entity_loader() before attempting to parse the feed via
+DOMDocument::loadXML().
 
 The above patches are also available in the 1.11 series of releases.
 
-Thanks goes to Johannes Greil and Kestutis Gudinavicius of SEC-Consult
-for reporting the original XXE vulnerability against Zend_XmlRpc and
-working with us to provide a working solution. Thanks goes to Pádraic
-Brady for helping us identify other XXE vectors, as well as identifying
-and patching the XEE vectors.
+Thanks goes to Yury Dyachenko at Positive Research Center for for
+reporting the XXE vulnerability and reviewing the patches created to fix
+the issue.
 
 
 NEW FEATURES

+ 1 - 1
library/Zend/Version.php

@@ -32,7 +32,7 @@ final class Zend_Version
     /**
      * Zend Framework version identification - see compareVersion()
      */
-    const VERSION = '1.12.0';
+    const VERSION = '1.12.1';
 
     /**
      * The latest stable version Zend Framework available