There is one related CVE tracked by nist, using the parso_project:parso CPE,
which doesn't match the default python:parso CPE.

See CVE db query:
sqlite> select * from products where PRODUCT like 'parso';
CVE-2019-12760|parso_project|parso|||0.4.0|<=

Set the CVE_PRODUCT accordingly.

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 meta-python/recipes-devtools/python/python3-parso_0.8.5.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb 
b/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb
index e609a4ad73..2bde8c3f40 100644
--- a/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb
+++ b/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb
@@ -7,6 +7,8 @@ PYPI_PACKAGE = "parso"
 
 SRC_URI[sha256sum] = 
"034d7354a9a018bdce352f48b2a8a450f05e9d6ee85db84764e9b6bd96dafe5a"
 
+CVE_PRODUCT = "parso"
+
 inherit setuptools3 pypi
 
 RDEPENDS:${PN} = " \
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#123033): 
https://lists.openembedded.org/g/openembedded-devel/message/123033
Mute This Topic: https://lists.openembedded.org/mt/116999121/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to