cb5bfd63d9
Fixes the following security issue: CVE-2021-28658: Potential directory-traversal via uploaded files MultiPartParser allowed directory-traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability. For more details, see the announcement: https://www.djangoproject.com/weblog/2021/apr/06/security-releases/ Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 lines
326 B
Plaintext
6 lines
326 B
Plaintext
# md5, sha256 from https://pypi.org/pypi/django/json
|
|
md5 f444fdd6ff8edec132991cbc343368d4 Django-3.0.14.tar.gz
|
|
sha256 d58d8394036db75a81896037d757357e79406e8f68816c3e8a28721c1d9d4c11 Django-3.0.14.tar.gz
|
|
# Locally computed sha256 checksums
|
|
sha256 b846415d1b514e9c1dff14a22deb906d794bc546ca6129f950a18cd091e2a669 LICENSE
|