diff mbox series

[1/2] xerces-c: fix escaping in CVE_PRODUCT

Message ID 20260414134543.2799524-1-ross.burton@arm.com
State Under Review
Headers show
Series [1/2] xerces-c: fix escaping in CVE_PRODUCT | expand

Commit Message

Ross Burton April 14, 2026, 1:45 p.m. UTC
The CPE parsing in oe-core's cve_check.py now handles escapes correctly[1]
so we don't need to escape in CVE_PRODUCT.

[1] oe-core 3c73dafd03b ("cve_check: Improve escaping of special characters in CPE 2.3")

Signed-off-by: Ross Burton <ross.burton@arm.com>
---
 meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
diff mbox series

Patch

diff --git a/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb b/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb
index 102e329878..0a3fbf5b93 100644
--- a/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb
+++ b/meta-oe/recipes-devtools/xerces-c/xerces-c_3.3.0.bb
@@ -9,7 +9,7 @@  SECTION =  "libs"
 LICENSE = "Apache-2.0"
 LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57"
 
-CVE_PRODUCT = "xerces-c\+\+"
+CVE_PRODUCT = "xerces-c++"
 
 SRC_URI = "http://archive.apache.org/dist/xerces/c/3/sources/${BP}.tar.bz2 \
     file://0001-aclocal.m4-don-t-use-full-path-of-with_curl-in-xerce.patch \