summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-django_2.2.28.bb
diff options
context:
space:
mode:
authorSoumya Sambu <soumya.sambu@windriver.com>2025-01-10 13:17:53 +0000
committerArmin Kuster <akuster808@gmail.com>2025-01-22 19:20:02 -0500
commit580693f8b9e0e27ba984d83e3e4b4b8a749b8480 (patch)
treec6a8f7ee7bc81aeb9b6bd2b537b27d6f8c8953d0 /meta-python/recipes-devtools/python/python3-django_2.2.28.bb
parentff5e933e58384b180a339fb8808478db1ff4ade7 (diff)
downloadmeta-openembedded-580693f8b9e0e27ba984d83e3e4b4b8a749b8480.tar.gz
python3-django: Fix CVE-2024-38875
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets. References: https://nvd.nist.gov/vuln/detail/CVE-2024-38875 https://github.com/advisories/GHSA-qg2p-9jwr-mmqf Upstream-patch: https://github.com/django/django/commit/79f368764295df109a37192f6182fb6f361d85b5 Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-django_2.2.28.bb')
-rw-r--r--meta-python/recipes-devtools/python/python3-django_2.2.28.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta-python/recipes-devtools/python/python3-django_2.2.28.bb b/meta-python/recipes-devtools/python/python3-django_2.2.28.bb
index 7f5861f5d3..f082de9d72 100644
--- a/meta-python/recipes-devtools/python/python3-django_2.2.28.bb
+++ b/meta-python/recipes-devtools/python/python3-django_2.2.28.bb
@@ -12,6 +12,7 @@ SRC_URI += "file://CVE-2023-31047.patch \
12 file://CVE-2023-46695.patch \ 12 file://CVE-2023-46695.patch \
13 file://CVE-2024-24680.patch \ 13 file://CVE-2024-24680.patch \
14 file://CVE-2024-42005.patch \ 14 file://CVE-2024-42005.patch \
15 file://CVE-2024-38875.patch \
15 " 16 "
16 17
17SRC_URI[sha256sum] = "0200b657afbf1bc08003845ddda053c7641b9b24951e52acd51f6abda33a7413" 18SRC_URI[sha256sum] = "0200b657afbf1bc08003845ddda053c7641b9b24951e52acd51f6abda33a7413"