mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-04-24 10:16:24 +00:00
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The
django.contrib.auth.forms.PasswordResetForm class, when used in a view
implementing password reset flows, allows remote attackers to enumerate
user e-mail addresses by sending password reset requests and observing
the outcome (only when e-mail sending is consistently failing).
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-45231
Upstream-patch:
bf4888d317
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
33 lines
1.1 KiB
BlitzBasic
33 lines
1.1 KiB
BlitzBasic
require python-django.inc
|
|
|
|
# Pin to 2.2.x LTS releases ONLY for this recipe
|
|
UPSTREAM_CHECK_REGEX = "/${PYPI_PACKAGE}/(?P<pver>(2\.2\.\d*)+)/"
|
|
|
|
inherit setuptools3
|
|
|
|
SRC_URI += "file://CVE-2023-31047.patch \
|
|
file://CVE-2023-36053.patch \
|
|
file://CVE-2023-41164.patch \
|
|
file://CVE-2023-43665.patch \
|
|
file://CVE-2023-46695.patch \
|
|
file://CVE-2024-24680.patch \
|
|
file://CVE-2024-42005.patch \
|
|
file://CVE-2024-38875.patch \
|
|
file://CVE-2023-23969.patch \
|
|
file://CVE-2024-39614.patch \
|
|
file://CVE-2024-41989-0001.patch \
|
|
file://CVE-2024-41989-0002.patch \
|
|
file://CVE-2024-41989-0003.patch \
|
|
file://CVE-2024-41989-0004.patch \
|
|
file://CVE-2024-41990.patch \
|
|
file://CVE-2024-41991.patch \
|
|
file://CVE-2024-45230.patch \
|
|
file://CVE-2024-45231.patch \
|
|
"
|
|
|
|
SRC_URI[sha256sum] = "0200b657afbf1bc08003845ddda053c7641b9b24951e52acd51f6abda33a7413"
|
|
|
|
RDEPENDS:${PN} += "\
|
|
${PYTHON_PN}-sqlparse \
|
|
"
|