mirror of
https://github.com/openembedded/meta-openembedded.git
synced 2026-03-23 14:30:26 +00:00
python-pyjwt: upgrade 2.11.0 -> 2.12.1
Contains fix for CVE-2026-32597. Since NVD tracks this CVE without version info, mark the CVE explicitly patched. Changes: 2.12.1: Add typing_extensions dependency for Python < 3.11 2.12.0: chore(docs): fix docs build Annotate PyJWKSet.keys for pyright fix: close HTTPError to prevent ResourceWarning on Python 3.14 chore: remove superfluous constants chore(tests): enable mypy Bump actions/download-artifact from 7 to 8 fix: do not store reference to algorithms dict on PyJWK Use PyJWK algorithm when encoding without explicit algorithm Validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. (CVE-2026-32597) Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
This commit is contained in:
@@ -5,11 +5,12 @@ HOMEPAGE = "https://github.com/jpadilla/pyjwt"
|
||||
LICENSE = "MIT"
|
||||
LIC_FILES_CHKSUM = "file://LICENSE;md5=e4b56d2c9973d8cf54655555be06e551"
|
||||
|
||||
SRC_URI[sha256sum] = "35f95c1f0fbe5d5ba6e43f00271c275f7a1a4db1dab27bf708073b75318ea623"
|
||||
SRC_URI[sha256sum] = "c74a7a2adf861c04d002db713dd85f84beb242228e671280bf709d765b03672b"
|
||||
|
||||
PYPI_PACKAGE = "pyjwt"
|
||||
CVE_PRODUCT = "pyjwt"
|
||||
CVE_STATUS[CVE-2025-45768] = "disputed: vulnerability can be avoided if the library is used correctly"
|
||||
CVE_STATUS[CVE-2026-32597] = "fixed-version: fixed in 2.12.0"
|
||||
|
||||
inherit pypi python_setuptools_build_meta
|
||||
|
||||
@@ -19,3 +20,4 @@ RDEPENDS:${PN} = "\
|
||||
"
|
||||
|
||||
BBCLASSEXTEND = "native nativesdk"
|
||||
|
||||
Reference in New Issue
Block a user