[OE-core] [PATCH 1/1] openssl: follow OE's rule for specifying CVE ID

Chen Qi Qi.Chen at windriver.com
Wed Mar 27 09:25:56 UTC 2019


Signed-off-by: Chen Qi <Qi.Chen at windriver.com>
---
 meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
index 59a92f0..900ef97 100644
--- a/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
+++ b/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
@@ -32,7 +32,7 @@ because no such use sets such a long nonce value. However user
 applications that use this cipher directly and set a non-default nonce
 length to be longer than 12 bytes may be vulnerable.
 
-CVE-2019-1543
+CVE: CVE-2019-1543
 
 Fixes #8345
 
-- 
1.9.1



More information about the Openembedded-core mailing list