There is one related CVE tracked by nist, using the parso_project:parso CPE, which doesn't match the default python:parso CPE.
See CVE db query: sqlite> select * from products where PRODUCT like 'parso'; CVE-2019-12760|parso_project|parso|||0.4.0|<= Set the CVE_PRODUCT accordingly. Signed-off-by: Gyorgy Sarvari <[email protected]> --- meta-python/recipes-devtools/python/python3-parso_0.8.5.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb b/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb index e609a4ad73..2bde8c3f40 100644 --- a/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb +++ b/meta-python/recipes-devtools/python/python3-parso_0.8.5.bb @@ -7,6 +7,8 @@ PYPI_PACKAGE = "parso" SRC_URI[sha256sum] = "034d7354a9a018bdce352f48b2a8a450f05e9d6ee85db84764e9b6bd96dafe5a" +CVE_PRODUCT = "parso" + inherit setuptools3 pypi RDEPENDS:${PN} = " \
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#123033): https://lists.openembedded.org/g/openembedded-devel/message/123033 Mute This Topic: https://lists.openembedded.org/mt/116999121/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
