Skip to content

Commit d97dbbb

Browse files
mnoconglye
andcommitted
Merge commit from fork
* Update doc for 3.3.42 and 4.6.19 * Before initial review fixes * Review fixes * Bumped latest tag * Changed the format of Rector commands * Apply suggestions from code review Co-authored-by: Gunnstein Lye <[email protected]> * Review fixes * Removed rector info --------- Co-authored-by: Gunnstein Lye <[email protected]>
1 parent 4945957 commit d97dbbb

File tree

3 files changed

+42
-3
lines changed

3 files changed

+42
-3
lines changed

docs/update_and_migration/from_3.3/update_from_3.3.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -512,6 +512,31 @@ Adjust the web server configuration to prevent direct access to the `index.php`
512512

513513
See [the updated Apache and nginx template files](https://github.com/ibexa/post-install/pull/70/files) for more information.
514514

515+
#### Removed `symfony/serializer-pack` dependency
516+
517+
This release no longer directly requires the `symfony/serializer-pack` Composer dependency, which can remove some dependencies from your project during the update process.
518+
519+
If you rely on them in your project, for example by using Symfony's `ObjectNormalizer` to create your own REST endpoints, run the following command before updating [[= product_name_base =]] packages:
520+
521+
``` bash
522+
composer require symfony/serializer-pack
523+
```
524+
525+
Then, verify that Symfony Flex installed the versions you were using before.
526+
527+
### v3.3.42
528+
529+
#### Security
530+
531+
This release fixes a critical vulnerability in the [RichText field type](richtextfield.md).
532+
By entering a maliciously crafted input into the RichText field type's XML, the attacker could perform an attack using [XML external entity (XXE) injection](https://portswigger.net/web-security/xxe).
533+
To exploit this vulnerability, an attacker would need to have edit permission to content with RichText fields.
534+
535+
For more information, see the [published security advisory IBEXA-SA-2025-002](https://developers.ibexa.co/security-advisories/ibexa-sa-2025-002-xxe-vulnerability-in-richtext).
536+
537+
Evaluate the vulnerability to determine whether you might have been affected.
538+
If so, take appropriate action.
539+
There are no additional update steps to execute.
515540

516541
## Finish the update
517542

docs/update_and_migration/from_4.6/update_from_4.6.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -276,4 +276,18 @@ There are no additional update steps to execute.
276276

277277
## v4.6.18
278278

279-
No additional steps needed.
279+
No additional steps needed.
280+
281+
## v4.6.19
282+
283+
### Security
284+
285+
This release fixes a critical vulnerability in the [RichText field type](richtextfield.md).
286+
By entering a maliciously crafted input into the RichText field type's XML, the attacker could perform an attack using [XML external entity (XXE) injection](https://portswigger.net/web-security/xxe).
287+
To exploit this vulnerability, an attacker would need to have edit permission to content with RichText fields.
288+
289+
For more information, see the [published security advisory IBEXA-SA-2025-002](https://developers.ibexa.co/security-advisories/ibexa-sa-2025-002-xxe-vulnerability-in-richtext).
290+
291+
Evaluate the vulnerability to determine whether you might have been affected.
292+
If so, take appropriate action.
293+
There are no additional update steps to execute.

mkdocs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -697,14 +697,14 @@ extra:
697697

698698
# Global variables - latest tag versions
699699
latest_tag_2_5: '2.5.32'
700-
latest_tag_3_3: '3.3.41'
700+
latest_tag_3_3: '3.3.42'
701701
latest_tag_4_0: '4.0.8'
702702
latest_tag_4_1: '4.1.5'
703703
latest_tag_4_2: '4.2.4'
704704
latest_tag_4_3: '4.3.5'
705705
latest_tag_4_4: '4.4.4'
706706
latest_tag_4_5: '4.5.7'
707-
latest_tag_4_6: '4.6.18'
707+
latest_tag_4_6: '4.6.19'
708708

709709
symfony_doc: 'https://symfony.com/doc/5.x'
710710
user_doc: 'https://doc.ibexa.co/projects/userguide/en/3.3'

0 commit comments

Comments
 (0)