From a4583e0e8012fe661bc2622aab63554324a3c72d Mon Sep 17 00:00:00 2001 From: Gyorgy Sarvari Date: Mon, 23 Feb 2026 20:18:42 +0100 Subject: [PATCH] libcdio: mark CVE-2024-36600 fixed Details: https://nvd.nist.gov/vuln/detail/CVE-2024-36600 The vulnerability is fixed since 2.2.1.rc1[1], and officially since v2.3.0. However NVD tracks it like v2.3.0 was still vulnerable. Mark the CVE explicitly patched. [1]: https://github.com/libcdio/libcdio/blob/master/NEWS.md Signed-off-by: Gyorgy Sarvari Signed-off-by: Khem Raj --- meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb b/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb index 11e84c6505..20ffbffd98 100644 --- a/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb +++ b/meta-oe/recipes-multimedia/libcdio/libcdio_2.3.0.bb @@ -29,3 +29,5 @@ python libcdio_split_packages() { } PACKAGESPLITFUNCS =+ "libcdio_split_packages" + +CVE_STATUS[CVE-2024-36600] = "fixed-version: fixed in v2.3.0"