mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-01-01 13:58:06 +00:00
The related CVEs are tracked under multiple vendor IDs (but none of them are associated with the default "python" vendor). Query from CVE db: sqlite> select * from products where product like 'flask-cors'; CVE-2020-25032|flask-cors_project|flask-cors|||3.0.9|< CVE-2024-1681|corydolphin|flask-cors|4.0.0|=|| CVE-2024-6221|corydolphin|flask-cors|4.0.1|=|| CVE-2024-6839|flask-cors_project|flask-cors|4.0.1|=|| CVE-2024-6844|flask-cors_project|flask-cors|4.0.1|=|| CVE-2024-6866|flask-cors_project|flask-cors|4.0.1|=|| Set the CVE_PRODUCT so it matches the relevant entries. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
24 lines
672 B
BlitzBasic
24 lines
672 B
BlitzBasic
HOMEPAGE = "https://pypi.python.org/pypi/Flask-Cors/"
|
|
SUMMARY = "A Flask extension adding a decorator for CORS support"
|
|
DESCRIPTION = "\
|
|
A Flask extension for handling Cross Origin Resource Sharing (CORS), making cross-origin AJAX possible \
|
|
"
|
|
SECTION = "devel/python"
|
|
LICENSE = "MIT"
|
|
LIC_FILES_CHKSUM = "file://LICENSE;md5=118fecaa576ab51c1520f95e98db61ce"
|
|
|
|
PYPI_PACKAGE = "Flask-Cors"
|
|
UPSTREAM_CHECK_PYPI_PACKAGE = "${PYPI_PACKAGE}"
|
|
|
|
SRC_URI += " \
|
|
file://CVE-2024-6221.patch \
|
|
"
|
|
|
|
SRC_URI[sha256sum] = "f268522fcb2f73e2ecdde1ef45e2fd5c71cc48fe03cffb4b441c6d1b40684eb0"
|
|
|
|
CVE_PRODUCT = "flask-cors"
|
|
|
|
inherit pypi setuptools3
|
|
|
|
RDEPENDS:${PN} += "python3-flask"
|