mirror of
https://github.com/openembedded/meta-openembedded.git
synced 2026-02-07 12:00:21 +00:00
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings. Since, there is no ptest available for python3-django so have not tested the patch changes at runtime. References: https://security-tracker.debian.org/tracker/CVE-2024-24680 https://docs.djangoproject.com/en/dev/releases/4.2.10/ Signed-off-by: Rahul Janani Pandi <RahulJanani.Pandi@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
21 lines
570 B
BlitzBasic
21 lines
570 B
BlitzBasic
require python-django.inc
|
|
|
|
# Pin to 2.2.x LTS releases ONLY for this recipe
|
|
UPSTREAM_CHECK_REGEX = "/${PYPI_PACKAGE}/(?P<pver>(2\.2\.\d*)+)/"
|
|
|
|
inherit setuptools3
|
|
|
|
SRC_URI += "file://CVE-2023-31047.patch \
|
|
file://CVE-2023-36053.patch \
|
|
file://CVE-2023-41164.patch \
|
|
file://CVE-2023-43665.patch \
|
|
file://CVE-2023-46695.patch \
|
|
file://CVE-2024-24680.patch \
|
|
"
|
|
|
|
SRC_URI[sha256sum] = "0200b657afbf1bc08003845ddda053c7641b9b24951e52acd51f6abda33a7413"
|
|
|
|
RDEPENDS:${PN} += "\
|
|
${PYTHON_PN}-sqlparse \
|
|
"
|