0ea753f8d3
Fixes the following security vulnerability: - CVE-2019-19844: Potential account hijack via password reset form By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account In addition, a number of bugs have been fixed. For details, see the release notes: https://docs.djangoproject.com/en/dev/releases/3.0.1/ Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
6 lines
321 B
Plaintext
6 lines
321 B
Plaintext
# md5, sha256 from https://pypi.org/pypi/django/json
|
|
md5 12f434ed7ccd6ee57be6f05a45e20e97 Django-3.0.1.tar.gz
|
|
sha256 315b11ea265dd15348d47f2cbb044ef71da2018f6e582fed875c889758e6f844 Django-3.0.1.tar.gz
|
|
# Locally computed sha256 checksums
|
|
sha256 b846415d1b514e9c1dff14a22deb906d794bc546ca6129f950a18cd091e2a669 LICENSE
|