Relevant CVEs are tracked with pywbem_project:pywbem CPE instead of the (previously) expected python:pywbem.
See CVE db query: sqlite> select * from products where PRODUCT = 'pywbem'; CVE-2013-6418|pywbem_project|pywbem|||0.7|<= CVE-2013-6444|pywbem_project|pywbem|||0.7|<= Set the CVE_PRODUCT accordingly. Signed-off-by: Gyorgy Sarvari <[email protected]> --- meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb b/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb index 59c9914bc2..6857563079 100644 --- a/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb +++ b/meta-python/recipes-extended/pywbem/python3-pywbem_1.7.3.bb @@ -49,3 +49,5 @@ ALTERNATIVE:${PN} = "mof_compiler" ALTERNATIVE_TARGET[mof_compiler] = "${bindir}/mof_compiler" ALTERNATIVE_PRIORITY = "60" + +CVE_PRODUCT = "pywbem"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#123016): https://lists.openembedded.org/g/openembedded-devel/message/123016 Mute This Topic: https://lists.openembedded.org/mt/116996774/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
