From d1f1417caed648db2f81a1ec28c47bf958c01958 Mon Sep 17 00:00:00 2001 From: Mariusz Felisiak Date: Wed, 12 May 2021 10:42:01 +0200 Subject: [PATCH] Refs #32718 -- Corrected CVE-2021-31542 release notes. --- docs/releases/2.2.21.txt | 3 +-- docs/releases/3.1.9.txt | 3 +-- docs/releases/3.2.1.txt | 3 +-- 3 files changed, 3 insertions(+), 6 deletions(-) diff --git a/docs/releases/2.2.21.txt b/docs/releases/2.2.21.txt index f32aeadff7..2302df4285 100644 --- a/docs/releases/2.2.21.txt +++ b/docs/releases/2.2.21.txt @@ -13,5 +13,4 @@ CVE-2021-31542: Potential directory-traversal via uploaded files directory-traversal via uploaded files with suitably crafted file names. In order to mitigate this risk, stricter basename and path sanitation is now -applied. Specifically, empty file names and paths with dot segments will be -rejected. +applied. diff --git a/docs/releases/3.1.9.txt b/docs/releases/3.1.9.txt index 682270b901..a97b9b6cee 100644 --- a/docs/releases/3.1.9.txt +++ b/docs/releases/3.1.9.txt @@ -13,5 +13,4 @@ CVE-2021-31542: Potential directory-traversal via uploaded files directory-traversal via uploaded files with suitably crafted file names. In order to mitigate this risk, stricter basename and path sanitation is now -applied. Specifically, empty file names and paths with dot segments will be -rejected. +applied. diff --git a/docs/releases/3.2.1.txt b/docs/releases/3.2.1.txt index 97ac4ebc94..d828ba5927 100644 --- a/docs/releases/3.2.1.txt +++ b/docs/releases/3.2.1.txt @@ -13,8 +13,7 @@ CVE-2021-31542: Potential directory-traversal via uploaded files directory-traversal via uploaded files with suitably crafted file names. In order to mitigate this risk, stricter basename and path sanitation is now -applied. Specifically, empty file names and paths with dot segments will be -rejected. +applied. Bugfixes ========