b0f825f448
- Fix CVE-2021-43306: An exponential ReDoS (Regular Expression Denial
of Service) can be triggered in the jquery-validation npm package,
when an attacker is able to supply arbitrary input to the url2 method
- Fix CVE-2022-31147: The jQuery Validation Plugin (jquery-validation)
provides drop-in validation for forms. Versions of jquery-validation
prior to 1.19.5 are vulnerable to regular expression denial of service
(ReDoS) when an attacker is able to supply arbitrary input to the url2
method. This is due to an incomplete fix for CVE-2021-43306. Users
should upgrade to version 1.19.5 to receive a patch.
- Use LICENSE.md instead of README.md which is available since version
1.14.0 and
96b7036eb4
https://github.com/jquery-validation/jquery-validation/releases/tag/1.19.4
https://github.com/jquery-validation/jquery-validation/releases/tag/1.19.5
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
25 lines
910 B
Makefile
25 lines
910 B
Makefile
################################################################################
|
|
#
|
|
# jquery-validation
|
|
#
|
|
################################################################################
|
|
|
|
JQUERY_VALIDATION_VERSION = 1.19.5
|
|
JQUERY_VALIDATION_SITE = https://github.com/jquery-validation/jquery-validation/releases/download/$(JQUERY_VALIDATION_VERSION)
|
|
JQUERY_VALIDATION_SOURCE = jquery-validation-$(JQUERY_VALIDATION_VERSION).zip
|
|
JQUERY_VALIDATION_LICENSE = MIT
|
|
JQUERY_VALIDATION_LICENSE_FILES = LICENSE.md
|
|
JQUERY_VALIDATION_CPE_ID_VENDOR = jqueryvalidation
|
|
JQUERY_VALIDATION_CPE_ID_PRODUCT = jquery_validation
|
|
|
|
define JQUERY_VALIDATION_EXTRACT_CMDS
|
|
$(UNZIP) -d $(@D) $(JQUERY_VALIDATION_DL_DIR)/$(JQUERY_VALIDATION_SOURCE)
|
|
endef
|
|
|
|
define JQUERY_VALIDATION_INSTALL_TARGET_CMDS
|
|
$(INSTALL) -m 0644 -D $(@D)/dist/jquery.validate.min.js \
|
|
$(TARGET_DIR)/var/www/jquery.validate.js
|
|
endef
|
|
|
|
$(eval $(generic-package))
|