[OE-core] [PATCH 1/1] openssl: follow OE's rule for specifying CVE ID
Chen Qi
Qi.Chen at windriver.com
Wed Mar 27 09:25:56 UTC 2019
Signed-off-by: Chen Qi <Qi.Chen at windriver.com>
---
meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
index 59a92f0..900ef97 100644
--- a/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
+++ b/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
@@ -32,7 +32,7 @@ because no such use sets such a long nonce value. However user
applications that use this cipher directly and set a non-default nonce
length to be longer than 12 bytes may be vulnerable.
-CVE-2019-1543
+CVE: CVE-2019-1543
Fixes #8345
--
1.9.1
More information about the Openembedded-core
mailing list