The relevant CVEs are tracked in the CVE db with encode:httpx CPE instead of the default python:httpx. Set CVE_PRODUCT accordingly.
See CVE db query: sqlite> select * from products where product like '%httpx%'; CVE-2021-41945|encode|httpx|||0.23.0|< Signed-off-by: Gyorgy Sarvari <[email protected]> --- meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb b/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb index fc41d7d2b2..5bbf7475b6 100644 --- a/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb +++ b/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb @@ -7,6 +7,8 @@ inherit pypi python_hatchling SRC_URI[sha256sum] = "75e98c5f16b0f35b567856f597f06ff2270a374470a5c2392242528e3e3e42fc" +CVE_PRODUCT = "encode:httpx" + DEPENDS += "\ python3-hatch-fancy-pypi-readme-native \ "
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#123058): https://lists.openembedded.org/g/openembedded-devel/message/123058 Mute This Topic: https://lists.openembedded.org/mt/117009258/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
