diff --git a/data/release-notes/enterprise-server/3-3/16.yml b/data/release-notes/enterprise-server/3-3/16.yml deleted file mode 100644 index 86d2f89bed48..000000000000 --- a/data/release-notes/enterprise-server/3-3/16.yml +++ /dev/null @@ -1,6 +0,0 @@ -date: '2022-12-06' - -sections: - security_fixes: - - | - **HIGH**: Added an extra check to harden against a path traversal bug that could lead to remote code execution in GitHub Pages builds on GitHub Enterprise Server. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This bug was originally reported via GitHub's Bug Bounty program and assigned [CVE-2021-22870](https://nvd.nist.gov/vuln/detail/CVE-2021-22870). diff --git a/data/release-notes/enterprise-server/3-4/11.yml b/data/release-notes/enterprise-server/3-4/11.yml deleted file mode 100644 index 86d2f89bed48..000000000000 --- a/data/release-notes/enterprise-server/3-4/11.yml +++ /dev/null @@ -1,6 +0,0 @@ -date: '2022-12-06' - -sections: - security_fixes: - - | - **HIGH**: Added an extra check to harden against a path traversal bug that could lead to remote code execution in GitHub Pages builds on GitHub Enterprise Server. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This bug was originally reported via GitHub's Bug Bounty program and assigned [CVE-2021-22870](https://nvd.nist.gov/vuln/detail/CVE-2021-22870). diff --git a/data/release-notes/enterprise-server/3-5/8.yml b/data/release-notes/enterprise-server/3-5/8.yml deleted file mode 100644 index 86d2f89bed48..000000000000 --- a/data/release-notes/enterprise-server/3-5/8.yml +++ /dev/null @@ -1,6 +0,0 @@ -date: '2022-12-06' - -sections: - security_fixes: - - | - **HIGH**: Added an extra check to harden against a path traversal bug that could lead to remote code execution in GitHub Pages builds on GitHub Enterprise Server. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This bug was originally reported via GitHub's Bug Bounty program and assigned [CVE-2021-22870](https://nvd.nist.gov/vuln/detail/CVE-2021-22870). diff --git a/data/release-notes/enterprise-server/3-6/4.yml b/data/release-notes/enterprise-server/3-6/4.yml deleted file mode 100644 index 86d2f89bed48..000000000000 --- a/data/release-notes/enterprise-server/3-6/4.yml +++ /dev/null @@ -1,6 +0,0 @@ -date: '2022-12-06' - -sections: - security_fixes: - - | - **HIGH**: Added an extra check to harden against a path traversal bug that could lead to remote code execution in GitHub Pages builds on GitHub Enterprise Server. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This bug was originally reported via GitHub's Bug Bounty program and assigned [CVE-2021-22870](https://nvd.nist.gov/vuln/detail/CVE-2021-22870).