Zend reports: ZF2014-04: Potential SQL injection in the ORDER implementation of Zend_Db_Select The implementation of the ORDER BY SQL statement in Zend_Db_Select of Zend Framework 1 contains a potential SQL injection when the query string passed contains parentheses. External references: http://framework.zend.com/security/advisory/ZF2014-04
Created php-ZendFramework tracking bugs for this issue: Affects: fedora-all [bug 1117546]
Created php-ZendFramework tracking bugs for this issue: Affects: epel-5 [bug 1117547]
Created php-ZendFramework tracking bugs for this issue: Affects: epel-6 [bug 1117548]
php-ZendFramework-1.12.7-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
php-ZendFramework-1.12.7-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
php-ZendFramework-1.12.7-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.