| Message ID | 20260223191850.1049304-2-skandigraun@gmail.com |
|---|---|
| State | New |
| Headers | show |
| Series | [meta-oe,01/13] freerdp: patch CVE-2026-22852 | expand |
diff --git a/meta-oe/recipes-support/freerdp/freerdp_2.11.7.bb b/meta-oe/recipes-support/freerdp/freerdp_2.11.7.bb index 70198a1e21..63dc177cbe 100644 --- a/meta-oe/recipes-support/freerdp/freerdp_2.11.7.bb +++ b/meta-oe/recipes-support/freerdp/freerdp_2.11.7.bb @@ -119,6 +119,7 @@ python populate_packages:prepend () { CVE_STATUS[CVE-2024-32662] = "fixed-version: 2.x is not affected, bug was introduced in 3.0.0" CVE_STATUS[CVE-2025-68118] = "not-applicable-platform: Windows-only vulnerability" +CVE_STATUS[CVE-2026-22853] = "cpe-incorrect: the vulnerability was introduced in 3.9.0" # avoid http://errors.yoctoproject.org/Errors/Details/852862/ # fixed in freerdp3 with https://github.com/FreeRDP/FreeRDP/pull/10553
Details: https://nvd.nist.gov/vuln/detail/CVE-2026-22853 The vulnerable feature was introduced in v3.9.0[1], the recipe version is not affected. Ignore this CVE. [1]: https://github.com/FreeRDP/FreeRDP/commit/a4bd5ba8863c0959501d4604159042a311dae85a Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- meta-oe/recipes-support/freerdp/freerdp_2.11.7.bb | 1 + 1 file changed, 1 insertion(+)