mirror of
https://git.yoctoproject.org/git/poky
synced 2026-01-01 13:58:04 +00:00
Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service
when using the Lexer class to parse. This also affects babelplugin and linguaplugin.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-40023
Reference to Upstream Patch:
925760291d
(From OE-Core rev: 34727812b54fd52f85806f4f95702286d551b5fd)
Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
21 lines
559 B
BlitzBasic
21 lines
559 B
BlitzBasic
SUMMARY = "Templating library for Python"
|
|
HOMEPAGE = "http://www.makotemplates.org/"
|
|
SECTION = "devel/python"
|
|
LICENSE = "MIT"
|
|
LIC_FILES_CHKSUM = "file://LICENSE;md5=943eb67718222db21d44a4ef1836675f"
|
|
|
|
PYPI_PACKAGE = "Mako"
|
|
|
|
SRC_URI += "file://CVE-2022-40023.patch"
|
|
|
|
inherit pypi python_setuptools_build_meta
|
|
|
|
SRC_URI[sha256sum] = "4e9e345a41924a954251b95b4b28e14a301145b544901332e658907a7464b6b2"
|
|
|
|
RDEPENDS:${PN} = "${PYTHON_PN}-html \
|
|
${PYTHON_PN}-netclient \
|
|
${PYTHON_PN}-threading \
|
|
"
|
|
|
|
BBCLASSEXTEND = "native nativesdk"
|