| Message ID | 20260420-cve-product-v2-1-3396c3e22042@bootlin.com |
|---|---|
| State | Under Review |
| Headers | show |
| Series | [v2] variables: add precision about special characters in CVE_PRODUCT | expand |
diff --git a/documentation/ref-manual/variables.rst b/documentation/ref-manual/variables.rst index 317b75913396..6f76f1c3491e 100644 --- a/documentation/ref-manual/variables.rst +++ b/documentation/ref-manual/variables.rst @@ -2056,6 +2056,10 @@ system and gives an overview of their function and contents. CVE_PRODUCT = "vendor:package" + Since Wrynose (6.0), special characters must not be escaped. For example, + the :term:`CVE_PRODUCT` variable for the ``webkitgtk`` recipe must no + longer be written as ``webkitgtk\+`` but rather ``webkitgtk+``. + :term:`CVE_STATUS` The CVE ID which is patched or should be ignored. Here is an example from the :oe_layerindex:`Python3 recipe</layerindex/recipe/23823>`::
Indicate that special characters must not be escaped in CVE_PRODUCT starting from Wrynose. Signed-off-by: Benjamin Robin <benjamin.robin@bootlin.com> --- Changes in v2: - Update formulation as recommended by Quentin. - Link to v1: https://patch.msgid.link/20260420-cve-product-v1-1-812a75eba43b@bootlin.com --- documentation/ref-manual/variables.rst | 4 ++++ 1 file changed, 4 insertions(+) --- base-commit: 2c12ec7bf29aedeacf82970a9d2eb262fde4670e change-id: 20260420-cve-product-61f82ce503eb Best regards, -- Benjamin Robin <benjamin.robin@bootlin.com>