Details: https://nvd.nist.gov/vuln/detail/CVE-2024-36600

The vulnerability is fixed since 2.2.1.rc1[1], and officially
since v2.3.0. However NVD tracks it like v2.3.0 was still vulnerable.
Mark the CVE explicitly patched.

[1]: https://github.com/libcdio/libcdio/blob/master/NEWS.md

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb 
b/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb
index 11e84c6505..20ffbffd98 100644
--- a/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb
+++ b/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb
@@ -29,3 +29,5 @@ python libcdio_split_packages() {
 }
 
 PACKAGESPLITFUNCS =+ "libcdio_split_packages"
+
+CVE_STATUS[CVE-2024-36600] = "fixed-version: fixed in v2.3.0"
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#124559): 
https://lists.openembedded.org/g/openembedded-devel/message/124559
Mute This Topic: https://lists.openembedded.org/mt/117963230/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to