Refs #32718 -- Corrected CVE-2021-31542 release notes.
This commit is contained in:
parent
e6406853c3
commit
d1f1417cae
|
@ -13,5 +13,4 @@ CVE-2021-31542: Potential directory-traversal via uploaded files
|
||||||
directory-traversal via uploaded files with suitably crafted file names.
|
directory-traversal via uploaded files with suitably crafted file names.
|
||||||
|
|
||||||
In order to mitigate this risk, stricter basename and path sanitation is now
|
In order to mitigate this risk, stricter basename and path sanitation is now
|
||||||
applied. Specifically, empty file names and paths with dot segments will be
|
applied.
|
||||||
rejected.
|
|
||||||
|
|
|
@ -13,5 +13,4 @@ CVE-2021-31542: Potential directory-traversal via uploaded files
|
||||||
directory-traversal via uploaded files with suitably crafted file names.
|
directory-traversal via uploaded files with suitably crafted file names.
|
||||||
|
|
||||||
In order to mitigate this risk, stricter basename and path sanitation is now
|
In order to mitigate this risk, stricter basename and path sanitation is now
|
||||||
applied. Specifically, empty file names and paths with dot segments will be
|
applied.
|
||||||
rejected.
|
|
||||||
|
|
|
@ -13,8 +13,7 @@ CVE-2021-31542: Potential directory-traversal via uploaded files
|
||||||
directory-traversal via uploaded files with suitably crafted file names.
|
directory-traversal via uploaded files with suitably crafted file names.
|
||||||
|
|
||||||
In order to mitigate this risk, stricter basename and path sanitation is now
|
In order to mitigate this risk, stricter basename and path sanitation is now
|
||||||
applied. Specifically, empty file names and paths with dot segments will be
|
applied.
|
||||||
rejected.
|
|
||||||
|
|
||||||
Bugfixes
|
Bugfixes
|
||||||
========
|
========
|
||||||
|
|
Loading…
Reference in New Issue