82abd78a01
Fixes the following security issue: - CVE-2021-23336: Web cache poisoning via django.utils.http.limited_parse_qsl() Django contains a copy of urllib.parse.parse_qsl() which was added to backport some security fixes. A further security fix has been issued recently such that parse_qsl() no longer allows using ; as a query parameter separator by default. Django now includes this fix. See bpo-42967 for further details. For more details, see the advisory: https://www.djangoproject.com/weblog/2021/feb/19/security-releases/ Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
6 lines
326 B
Plaintext
6 lines
326 B
Plaintext
# md5, sha256 from https://pypi.org/pypi/django/json
|
|
md5 7020810fb65b17e82d22001883b63a12 Django-3.0.13.tar.gz
|
|
sha256 6f13c3e8109236129c49d65a42fbf30c928e66b05ca6862246061b9343ecbaf2 Django-3.0.13.tar.gz
|
|
# Locally computed sha256 checksums
|
|
sha256 b846415d1b514e9c1dff14a22deb906d794bc546ca6129f950a18cd091e2a669 LICENSE
|