[1.5.x] Fixed spelling mistake in file docs.
Backport of a3e88e64a4
from master
This commit is contained in:
parent
4fa3c04105
commit
5d647e5f17
|
@ -90,7 +90,7 @@ to the ``get_valid_name()`` method described above.
|
||||||
extension.
|
extension.
|
||||||
|
|
||||||
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
||||||
etc.) was appended to the filename until an avaible name in the destination
|
etc.) was appended to the filename until an available name in the destination
|
||||||
directory was found. A malicious user could exploit this deterministic
|
directory was found. A malicious user could exploit this deterministic
|
||||||
algorithm to create a denial-of-service attack. This change was also made
|
algorithm to create a denial-of-service attack. This change was also made
|
||||||
in Django 1.4.14.
|
in Django 1.4.14.
|
||||||
|
|
|
@ -88,7 +88,7 @@ The Storage Class
|
||||||
extension.
|
extension.
|
||||||
|
|
||||||
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
Previously, an underscore followed by a number (e.g. ``"_1"``, ``"_2"``,
|
||||||
etc.) was appended to the filename until an avaible name in the
|
etc.) was appended to the filename until an available name in the
|
||||||
destination directory was found. A malicious user could exploit this
|
destination directory was found. A malicious user could exploit this
|
||||||
deterministic algorithm to create a denial-of-service attack. This
|
deterministic algorithm to create a denial-of-service attack. This
|
||||||
change was also made in Django 1.4.14.
|
change was also made in Django 1.4.14.
|
||||||
|
|
Loading…
Reference in New Issue