Skip to content
This repository was archived by the owner on Nov 19, 2024. It is now read-only.

Hot Fix March 26 2019 #4049

Merged
merged 3 commits into from
Mar 26, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
19 changes: 19 additions & 0 deletions guides/v2.1/release-notes/ReleaseNotes2.1.16CE.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,25 @@ Although this release includes these security enhancements, no confirmed attacks

See [Magento Security Center](https://magento.com/security/patches/magento-2.2.7-and-2.1.16-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.1.16) have been ported to 2.2.7, 1.14.4.0, and 1.9.4.0, as appropriate.


## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A SQL injection vulnerability has been identified in 2.1.x Magento code. To quickly protect your store from this vulnerability, you'll need to install patch PRODSECBUG-2198 as well as upgrade to Magento 2.1.17. See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.

Follow these steps to download and apply this patch:

1. Access the Downloads page [here](https://magento.com/tech-resources/download#download2288).

2. Select the Git-based option from **Select your format**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).



## Highlights

Magento 2.1.16 contains over 30 security fixes and enhancements. See [Magento Security Center](https://magento.com/security/patches/magento-2.2.7-and-2.1.16-security-update) for more information.
Expand Down
23 changes: 23 additions & 0 deletions guides/v2.1/release-notes/ReleaseNotes2.1.16EE.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,29 @@ Although this release includes these security enhancements, no confirmed attacks

See [Magento Security Center](https://magento.com/security/patches/magento-2.2.7-and-2.1.16-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.1.16) have been ported to 2.2.7, 1.14.4.0, and 1.9.4.0, as appropriate.


## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A critical SQL injection vulnerability has been identified in 2.1.x Magento code. To quickly protect your store from this vulnerability, you'll need to install patch PRODSECBUG-2198 and upgrade to this relesae (2.1.17). See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.


Follow these steps to download and apply this patch:

1. Access [My Account](https://account.magento.com/customer/account/login).

2. Navigate to the **Downloads** tab. Select the Magento edition and version you need.

3. Select **Support Patches and Security Patches**, then **PRODSECBUG-2198**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).




## Highlights

Magento 2.1.16 contains over 30 security fixes and enhancements. See [Magento Security Center](https://magento.com/security/patches/magento-2.2.7-and-2.1.16-security-update) for more information.
Expand Down
19 changes: 19 additions & 0 deletions guides/v2.1/release-notes/ReleaseNotes2.1.17CE.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,25 @@ We are pleased to present {{site.data.var.ce}} 2.1.17. This release includes mul
This release include security enhancements that help close cross-site scripting, arbitrary code execution, and sensitive data disclosure vulnerabilities as well as other security issues. No confirmed attacks related to these issues have occurred to date. However, certain vulnerabilities can potentially be exploited to access customer information or take over administrator sessions. We recommend that you upgrade your Magento software to the latest version as soon as possible.


## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A SQL injection vulnerability has been identified in 2.1.x Magento code. To quickly protect your store from this vulnerability, you'll need to install patch PRODSECBUG-2198. See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.

Follow these steps to download and apply this patch:

1. Access the Downloads page [here](https://magento.com/tech-resources/download#download2288).

2. Select the Git-based option from **Select your format**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).




## Highlights

See [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.1.17) have been ported to 2.3.1, 2.2.8, 1.14.4.1, and 1.9.4.1, as appropriate.
Expand Down
20 changes: 20 additions & 0 deletions guides/v2.1/release-notes/ReleaseNotes2.1.17EE.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,26 @@ We are pleased to present {{site.data.var.ee}} 2.1.17. This release includes m
Although this release includes these security enhancements, no confirmed attacks related to these issues have occurred to date. However, certain vulnerabilities can potentially be exploited to access customer information or take over administrator sessions. We recommend that you upgrade your Magento software to the latest version as soon as possible.


## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A critical SQL injection vulnerability has been identified in 2.1.x Magento code. To quickly protect your store from this vulnerability, you'll need to install patch PRODSECBUG-2198 and upgrade to this relesae (2.1.17). See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.


Follow these steps to download and apply this patch:

1. Access [My Account](https://account.magento.com/customer/account/login).

2. Navigate to the **Downloads** tab. Select the Magento edition and version you need.

3. Select **Support Patches and Security Patches**, then **PRODSECBUG-2198**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).


## Highlights

See [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.1.17) have been ported to 2.3.1, 2.2.8, 1.14.4.1, and 1.9.4.1, as appropriate.
Expand Down
20 changes: 19 additions & 1 deletion guides/v2.2/release-notes/ReleaseNotes2.2.7CE.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ title: Magento Open Source 2.2.7 Release Notes

---

*Release notes published November 28 and last updated on December 10, 2018.*
*Release notes published November 28 and last updated on March 26, 2019.*


We are pleased to present Magento Open Source 2.2.7. This release includes over 30 critical enhancements to product security, over 150 core code fixes and enhancements, and over 350 community-submitted pull requests.
Expand All @@ -15,6 +15,24 @@ Although this release includes these security enhancements, no confirmed attacks
See [Magento Security Center](https://magento.com/security/patches/magento-2.2.7-and-2.1.16-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.2.7) have been ported to 2.1.16, 1.14.3.10, and 1.9.3.10, as appropriate.


## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A SQL injection vulnerability has been identified in pre-2.2.8 Magento code. To quickly protect your store from this vulnerability only, install patch PRODSECBUG-2198. However, to protect against this vulnerability and others, you must upgrade to Magento Commerce or Open Source 2.2.8. **We strongly suggest that you install these full patches as soon as you can**.

See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.

Follow these steps to download and apply this patch:

1. Access the Downloads page [here](https://magento.com/tech-resources/download#download2288).

2. Select the Git-based option from **Select your format**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).




Expand Down
22 changes: 21 additions & 1 deletion guides/v2.2/release-notes/ReleaseNotes2.2.7EE.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ title: Magento Commerce 2.2.7 Release Notes

---

*Release notes published November 28 and last updated on December 10, 2018.*
*Release notes published November 28 and last updated on March 26, 2019.*



Expand All @@ -16,6 +16,26 @@ Although this release includes these security enhancements, no confirmed attacks
See [Magento Security Center](https://magento.com/security/patches/magento-2.2.7-and-2.1.16-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.2.7) have been ported to 2.1.16, 1.14.4.0, and 1.9.4.0, as appropriate.


## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A SQL injection vulnerability has been identified in pre-2.2.8 Magento code. To quickly protect your store from this vulnerability only, install patch PRODSECBUG-2198. However, to protect against this vulnerability and others, you must upgrade to Magento Commerce or Open Source 2.2.8. **We strongly suggest that you install these full patches as soon as you can**.

See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.

Follow these steps to download and apply this patch:

1. Access [My Account](https://account.magento.com/customer/account/login).

2. Navigate to the **Downloads** tab. Select the Magento edition and version you need.

3. Select **Support Patches and Security Patches**, then **PRODSECBUG-2198**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).


## Highlights

Expand Down
33 changes: 14 additions & 19 deletions guides/v2.2/release-notes/ReleaseNotes2.2.8CE.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,21 @@ Although this release includes these security enhancements, no confirmed attacks

See [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.2.8) have been ported to 2.3.1, 2.1.17, 1.14.4.1, and 1.9.4.1, as appropriate.

## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A critical SQL injection vulnerability has been identified in 2.2.x Magento code. A fix for this issue is included in Magento 2.2.8. However, if you cannot immediately apply the full patch, you can quickly protect your store from this vulnerability by installing patch PRODSECBUG-2198. See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.

Follow these steps to download and apply this patch:

1. Access the Downloads page [here](https://magento.com/tech-resources/download#download2288).

2. Select the Git-based option from **Select your format**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).

## Highlights

Expand Down Expand Up @@ -113,25 +127,6 @@ In addition to security enhancements, this release contains the following functi
<!-- ENGCOM-3868 -->* `CustomerRepository::getList()` now loads custom attributes named `company`. *Fix submitted by [Govind Sharma](https://github.com/GovindaSharma) in pull request [20284](https://github.com/magento/magento2/pull/20284)*. [GitHub-17759](https://github.com/magento/magento2/issues/17759)


### B2B

<!-- MAGETWO-96442 -->* Merchants can now add a product to the default public catalog, and the product can be accessed by the product URL on the storefront. Previously, Magento did not add the product to the shared catalog and instead displayed this error, `Requested categories don't exist`.

<!-- MAGETWO-94884 -->* Magento no longer displays a duplicate **Add product** button when you change currency from the Order currency dropdown while creating an order from the Admin.

<!-- MAGETWO-94820 -->* Magento no longer deletes custom shared catalogs when the user that created it is deleted.

<!-- MAGETWO-85125 -->* Magento now loads the company profile, roles, and permissions sections of a company account when **Enable Reward Points Functionality** is set to **no** in the Admin, and you flush cache storage.

<!-- MAGETWO-88254 -->* Tier pricing remains in effect when you add a product with tier pricing to an order from the Admin. Previously, Magento converted tier prices to non-discounted product prices when you added more products to the order, applied a custom price to one of the products, or applied a coupon code to the order.

<!-- MAGETWO-90835 -->* You can now filter customers by status. Previously, Magento threw an SQL ERROR when you clicked on **Apply Filters** after setting the filter to status.

<!-- MAGETWO-94431 -->* Magento now displays products that merchants have added to the public catalog through **Product** > **Edit page** > **Shared Catalog**. Previously, these items appeared if added through **Catalog** > **Shared Catalog**, but not through **Product** > **Edit page** > **Shared Catalog**.

<!-- MAGETWO-89296 -->* Menus now close as expected from the Quick Order page in mobile view.


### Bundle products

<!-- MAGETWO-88810 -->* Bundle product SKUs are now built based on the order of the associated (selected) product ID numbers in ascending order. Previously, SKUs were built based on the order of the selected product ID numbers in ascending order instead of the order in which the option is added to the bundle product.
Expand Down
19 changes: 19 additions & 0 deletions guides/v2.2/release-notes/ReleaseNotes2.2.8EE.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,25 @@ Although this release includes these security enhancements, no confirmed attacks
See [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for a comprehensive discussion of these issues. All exploitable security issues fixed in this release (2.2.8) have been ported to 2.3.1, 2.1.17, 1.14.4.1, and 1.9.4.1, as appropriate.


## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A critical SQL injection vulnerability has been identified in 2.2.x Magento code. A fix for this issue is included in Magento 2.2.8. However, if you cannot immediately apply the full patch, you can quickly protect your store from this vulnerability by installing patch PRODSECBUG-2198. See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.


Follow these steps to download and apply this patch:

1. Access [My Account](https://account.magento.com/customer/account/login).

2. Navigate to the **Downloads** tab. Select the Magento edition and version you need.

3. Select **Support Patches and Security Patches**, then **PRODSECBUG-2198**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).


## Highlights

Expand Down
22 changes: 22 additions & 0 deletions guides/v2.3/release-notes/ReleaseNotes2.3.0Commerce.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,28 @@ We are pleased to present Magento Commerce 2.3.0 General Availability. This rele
Magento Commerce 2.3.0 includes a wealth of new features as well as hundreds of enhancements and fixes to the core product. Look for the following highlights in this release:



## Apply patch PRODSECBUG-2198 to address critical SQL injection vulnerability

A critical SQL injection vulnerability has been identified in pre-2.3.1 Magento code. To quickly protect your store from this vulnerability only, install patch PRODSECBUG-2198. However, to protect against this vulnerability and others, you must upgrade to Magento Commerce or Open Source 2.3.1. **We strongly suggest that you install these full patches as soon as you can**.

See the description of PRODSECBUG-2198 in the [Magento Security Center](https://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update) for information on this vulnerability.

Follow these steps to download and apply this patch:

1. Access [My Account](https://account.magento.com/customer/account/login).

2. Navigate to the **Downloads** tab. Select the Magento edition and version you need.

3. Select **Support Patches and Security Patches**, then **PRODSECBUG-2198**.

4. Download the patch and upload to a specific directory in your Magento installation such as `m2-hotfixes` (confirm that the directory is not accessible publicly).

5. From your project root, apply the patch.
 `git apply ./m2-hotfixes/<patch-file-name>`.

6. Refresh the cache from the Admin (**System** > **Cache Management**).


### Merchant tool enhancements

* **Inventory Management (provided by [Multi Source Inventory (MSI)](https://github.com/magento-engcom/msi))** is now available with Magento 2.3.0. It lets merchants manage inventory for all product types in a single warehouse and across complex shipping networks. Merchants can manage these locations as sources, tracking on-hand inventory quantities per product. Stocks map these sources and sales channels (websites) to provide an accurate, salable quantity as inventory pools for concurrent checkout and product reservations. Inventory Management also updates order and shipment options, giving you full control over your stock.
Expand Down
Loading