summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorChen Qi <Qi.Chen@windriver.com>2019-03-27 17:25:56 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2019-05-22 00:31:47 +0100
commitb715031fc6d30072df1d782a77e6da261569e684 (patch)
tree538b439b7868e41a90c7a4e3b89f05ce7d44abfc /meta
parentbe0b881078fbcce97677639bda0120946a3ab81f (diff)
downloadpoky-b715031fc6d30072df1d782a77e6da261569e684.tar.gz
poky-b715031fc6d30072df1d782a77e6da261569e684.tar.bz2
poky-b715031fc6d30072df1d782a77e6da261569e684.zip
openssl: follow OE's rule for specifying CVE ID
(From OE-Core rev: a3dd494337bbdf20d7bff651d533f944f270766e) Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
index 59a92f06e4..900ef97fce 100644
--- a/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
+++ b/meta/recipes-connectivity/openssl/openssl/CVE-2019-1543.patch
@@ -32,7 +32,7 @@ because no such use sets such a long nonce value. However user
applications that use this cipher directly and set a non-default nonce
length to be longer than 12 bytes may be vulnerable.
-CVE-2019-1543
+CVE: CVE-2019-1543
Fixes #8345