Skip to content

Commit 46f47e6

Browse files
committed
Merge branch '3.4' into 4.1
* 3.4: Add severity rankings to security policy Replaced the table of cache warmers by the debug:container command Fix list of core cache warmers
2 parents c34e5c3 + b0299f9 commit 46f47e6

File tree

2 files changed

+81
-12
lines changed

2 files changed

+81
-12
lines changed

contributing/code/security.rst

+72
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,78 @@ of the downstream projects included in this process:
9191
* Drupal (releases typically happen on Wednesdays)
9292
* eZPublish
9393

94+
Issue Severity
95+
--------------
96+
97+
In order to determine the severity of a security issue we take into account
98+
the complexity of any potential attack, the impact of the vulnerability and
99+
also how many projects it is likely to affect. This score out of 15 is then
100+
converted into a level of: Low, Medium, High, Critical, or Exceptional.
101+
102+
Attack Complexity
103+
~~~~~~~~~~~~~~~~~
104+
105+
*Score of between 1 and 5 depending on how complex it is to exploit the
106+
vulnerability*
107+
108+
* 4 - 5 Basic: attacker must follow a set of simple steps
109+
* 2 - 3 Complex: attacker must follow non-intuitive steps with a high level
110+
of dependencies
111+
* 1 - 2 High: A successful attack depends on conditions beyond the attacker's
112+
control. That is, a successful attack cannot be accomplished at will, but
113+
requires the attacker to invest in some measurable amount of effort in
114+
preparation or execution against the vulnerable component before a successful
115+
attack can be expected.
116+
117+
Impact
118+
~~~~~~
119+
120+
*Scores from the following areas are added together to produce a score. The
121+
score for Impact is capped at 6. Each area is scored between 0 and 4.*
122+
123+
* Integrity: Does this vulnerability cause non-public data to be accessible?
124+
If so, does the attacker have control over the data disclosed? (0-4)
125+
* Disclosure: Can this exploit allow system data (or data handled by the
126+
system) to be compromised? If so, does the attacker have control over
127+
modification? (0-4)
128+
* Code Execution: Does the vulnerability allow arbitrary code to be executed
129+
on an end-users system, or the server that it runs on? (0-4)
130+
* Availability: Is the availability of a service or application affected? Is
131+
it reduced availability or total loss of availability of a service /
132+
application? Availability includes networked services (e.g., databases) or
133+
resources such as consumption of network bandwidth, processor cycles, or
134+
disk space. (0-4)
135+
136+
Affected Projects
137+
~~~~~~~~~~~~~~~~~
138+
139+
*Scores from the following areas are added together to produce a score. The
140+
score for Affected Projects is capped at 4.*
141+
142+
* Will it affect some or all using a component? (1-2)
143+
* Is the usage of the component that would cause such a thing already
144+
considered bad practice? (0-1)
145+
* How common/popular is the component (e.g. Console vs HttpFoundation vs
146+
Lock)? (0-2)
147+
* Are a number of well-known open source projects using Symfony affected
148+
that requires coordinated releases? (0-1)
149+
150+
Score Totals
151+
~~~~~~~~~~~~
152+
153+
* Attack Complexity: 1 - 4
154+
* Impact: 1 - 6
155+
* Affected Projects: 1 - 4
156+
157+
Severity levels
158+
~~~~~~~~~~~~~~~
159+
160+
* Low: 1 - 5
161+
* Medium: 6 - 10
162+
* High: 11 - 12
163+
* Critical: 13 - 14
164+
* Exceptional: 15
165+
94166
Security Advisories
95167
-------------------
96168

reference/dic_tags.rst

+9-12
Original file line numberDiff line numberDiff line change
@@ -400,18 +400,15 @@ can also register it manually:
400400
application and/or bundles should be prepared for when the contents
401401
generated by the cache warmer are not available.
402402

403-
Core Cache Warmers
404-
~~~~~~~~~~~~~~~~~~
405-
406-
+-------------------------------------------------------------------------------------------+-----------+
407-
| Cache Warmer Class Name | Priority |
408-
+===========================================================================================+===========+
409-
| :class:`Symfony\\Bundle\\FrameworkBundle\\CacheWarmer\\TemplatePathsCacheWarmer` | 20 |
410-
+-------------------------------------------------------------------------------------------+-----------+
411-
| :class:`Symfony\\Bundle\\FrameworkBundle\\CacheWarmer\\RouterCacheWarmer` | 0 |
412-
+-------------------------------------------------------------------------------------------+-----------+
413-
| :class:`Symfony\\Bundle\\TwigBundle\\CacheWarmer\\TemplateCacheCacheWarmer` | 0 |
414-
+-------------------------------------------------------------------------------------------+-----------+
403+
.. _core-cache-warmers:
404+
405+
In addition to your own cache warmers, Symfony components and third-party
406+
bundles define cache warmers too for their own purposes. You can list them all
407+
with the following command:
408+
409+
.. code-block:: terminal
410+
411+
$ php bin/console debug:container --tag=kernel.cache_warmer
415412
416413
.. _dic-tags-kernel-event-listener:
417414

0 commit comments

Comments
 (0)