| Message ID | 20260414134543.2799524-1-ross.burton@arm.com |
|---|---|
| State | Under Review |
| Headers | show |
| Series | [1/2] xerces-c: fix escaping in CVE_PRODUCT | expand |
diff --git a/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb b/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb index 102e329878..0a3fbf5b93 100644 --- a/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb +++ b/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb @@ -9,7 +9,7 @@ SECTION = "libs" LICENSE = "Apache-2.0" LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57" -CVE_PRODUCT = "xerces-c\+\+" +CVE_PRODUCT = "xerces-c++" SRC_URI = "http://archive.apache.org/dist/xerces/c/3/sources/${BP}.tar.bz2 \ file://0001-aclocal.m4-don-t-use-full-path-of-with_curl-in-xerce.patch \
The CPE parsing in oe-core's cve_check.py now handles escapes correctly[1] so we don't need to escape in CVE_PRODUCT. [1] oe-core 3c73dafd03b ("cve_check: Improve escaping of special characters in CPE 2.3") Signed-off-by: Ross Burton <ross.burton@arm.com> --- meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)