Relevant CVEs are tracked with pywbem_project:pywbem CPE instead of
the (previously) expected python:pywbem.

See CVE db query:
sqlite> select * from products where PRODUCT = 'pywbem';
CVE-2013-6418|pywbem_project|pywbem|||0.7|<=
CVE-2013-6444|pywbem_project|pywbem|||0.7|<=

Set the CVE_PRODUCT accordingly.

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb 
b/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb
index 59c9914bc2..6857563079 100644
--- a/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb
+++ b/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb
@@ -49,3 +49,5 @@ ALTERNATIVE:${PN} = "mof_compiler"
 ALTERNATIVE_TARGET[mof_compiler] = "${bindir}/mof_compiler"
 
 ALTERNATIVE_PRIORITY = "60"
+
+CVE_PRODUCT = "pywbem"
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#123016): 
https://lists.openembedded.org/g/openembedded-devel/message/123016
Mute This Topic: https://lists.openembedded.org/mt/116996774/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to