The relevant CVEs are tracked in the CVE db with encode:httpx CPE
instead of the default python:httpx. Set CVE_PRODUCT accordingly.

See CVE db query:
sqlite> select * from products where product like '%httpx%';
CVE-2021-41945|encode|httpx|||0.23.0|<

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb 
b/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb
index fc41d7d2b2..5bbf7475b6 100644
--- a/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb
+++ b/meta-python/recipes-devtools/python/python3-httpx_0.28.1.bb
@@ -7,6 +7,8 @@ inherit pypi python_hatchling
 
 SRC_URI[sha256sum] = 
"75e98c5f16b0f35b567856f597f06ff2270a374470a5c2392242528e3e3e42fc"
 
+CVE_PRODUCT = "encode:httpx"
+
 DEPENDS += "\
     python3-hatch-fancy-pypi-readme-native \
 "
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#123058): 
https://lists.openembedded.org/g/openembedded-devel/message/123058
Mute This Topic: https://lists.openembedded.org/mt/117009258/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to