mirror of
https://git.yoctoproject.org/poky
synced 2026-05-10 17:59:32 +00:00
848be11a43
Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin. Reference: https://nvd.nist.gov/vuln/detail/CVE-2022-40023 Reference to Upstream Patch: https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c (From OE-Core rev: 34727812b54fd52f85806f4f95702286d551b5fd) Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
21 lines
559 B
BlitzBasic
21 lines
559 B
BlitzBasic
SUMMARY = "Templating library for Python"
|
|
HOMEPAGE = "http://www.makotemplates.org/"
|
|
SECTION = "devel/python"
|
|
LICENSE = "MIT"
|
|
LIC_FILES_CHKSUM = "file://LICENSE;md5=943eb67718222db21d44a4ef1836675f"
|
|
|
|
PYPI_PACKAGE = "Mako"
|
|
|
|
SRC_URI += "file://CVE-2022-40023.patch"
|
|
|
|
inherit pypi python_setuptools_build_meta
|
|
|
|
SRC_URI[sha256sum] = "4e9e345a41924a954251b95b4b28e14a301145b544901332e658907a7464b6b2"
|
|
|
|
RDEPENDS:${PN} = "${PYTHON_PN}-html \
|
|
${PYTHON_PN}-netclient \
|
|
${PYTHON_PN}-threading \
|
|
"
|
|
|
|
BBCLASSEXTEND = "native nativesdk"
|