diff mbox series

[v2] variables: add precision about special characters in CVE_PRODUCT

Message ID 20260420-cve-product-v2-1-3396c3e22042@bootlin.com
State Under Review
Headers show
Series [v2] variables: add precision about special characters in CVE_PRODUCT | expand

Commit Message

Benjamin Robin April 20, 2026, 8:50 a.m. UTC
Indicate that special characters must not be escaped in CVE_PRODUCT
starting from Wrynose.

Signed-off-by: Benjamin Robin <benjamin.robin@bootlin.com>
---
Changes in v2:
- Update formulation as recommended by Quentin.
- Link to v1: https://patch.msgid.link/20260420-cve-product-v1-1-812a75eba43b@bootlin.com
---
 documentation/ref-manual/variables.rst | 4 ++++
 1 file changed, 4 insertions(+)


---
base-commit: 2c12ec7bf29aedeacf82970a9d2eb262fde4670e
change-id: 20260420-cve-product-61f82ce503eb

Best regards,
--  
Benjamin Robin <benjamin.robin@bootlin.com>
diff mbox series

Patch

diff --git a/documentation/ref-manual/variables.rst b/documentation/ref-manual/variables.rst
index 317b75913396..6f76f1c3491e 100644
--- a/documentation/ref-manual/variables.rst
+++ b/documentation/ref-manual/variables.rst
@@ -2056,6 +2056,10 @@  system and gives an overview of their function and contents.
 
          CVE_PRODUCT = "vendor:package"
 
+      Since Wrynose (6.0), special characters must not be escaped. For example,
+      the :term:`CVE_PRODUCT` variable for the ``webkitgtk`` recipe must no
+      longer be written as ``webkitgtk\+`` but rather ``webkitgtk+``.
+
    :term:`CVE_STATUS`
       The CVE ID which is patched or should be ignored. Here is
       an example from the :oe_layerindex:`Python3 recipe</layerindex/recipe/23823>`::