Vivaweb Zend Framework
- dev-master / 3.0.x-dev
- dev-develop / 3.1.x-dev
This package is not auto-updated.
Last update: 2020-05-14 14:36:54 UTC
Zend Framework 2.3.9
This is the ninth maintenance release for the version 2.3 series.
11 May 2015
This release contains the following security fixes introduced in 2.3.8:
Zend\Httpwere both susceptible to CRLF Injection Attack vectors (for HTTP, this is often referred to as HTTP Response Splitting). Both components were updated to perform header value validations to ensure no values contain characters not detailed in their corresponding specifications, and will raise exceptions on detection. Each also provides new facilities for both validating and filtering header values prior to injecting them into header classes.
If you use either
Zend\Http(which includes users of
Zend\Mvc), we recommend upgrading immediately.
Additionally, this release fixes several issues raised by the patch for the above security fix, including:
- #7506 resolves issues when UTF-8 values are used in Mail headers, particularly addresses.
- #7507 ensures that array values can be used with cookies.
- #7514 ensures that multipart
MIME messages can be added to
Zend\Mail\Messageinstances in such a way that they do not conflict with ZF2015-04.
Please see CHANGELOG.md.
Zend Framework 2 requires PHP 5.3.23 or later; we recommend using the latest PHP version whenever possible.
Please see INSTALL.md.
Online documentation can be found at http://framework.zend.com/manual. Questions that are not addressed in the manual should be directed to the appropriate mailing list:
If you find code in this release behaving in an unexpected manner or contrary to its documented behavior, please create an issue in our GitHub issue tracker:
If you would like to be notified of new releases, you can subscribe to the fw-announce mailing list by sending a blank message to email@example.com.
If you have encountered a potential security vulnerability in Zend Framework, please report it to us at firstname.lastname@example.org. We will work with you to verify the vulnerability and patch it.
When reporting issues, please provide the following information:
- Component(s) affected
- A description indicating how to reproduce the issue
- A summary of the security vulnerability and impact
We request that you contact us via the email address above and give the project contributors a chance to resolve the vulnerability and issue a new release prior to any public exposure; this helps protect Zend Framework users and provides them with a chance to upgrade and/or update in order to protect their applications.
For sensitive email communications, please use our PGP key.
The files in this archive are released under the Zend Framework license. You can find a copy of this license in LICENSE.txt.
The Zend Framework team would like to thank all the contributors to the Zend Framework project, our corporate sponsor, and you, the Zend Framework user. Please visit us sometime soon at http://framework.zend.com.