CVE-2024-36600

NameCVE-2024-36600
DescriptionBuffer Overflow Vulnerability in libcdio v2.1.0 allows an attacker to execute arbitrary code via a crafted ISO 9660 image file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcdio (PTS)buster2.0.0-2fixed
bullseye2.1.0-2fixed
bookworm2.1.0-4fixed
sid, trixie2.1.0-4.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcdiosource(unstable)(not affected)

Notes

- libcdio <not-affected> (Vulnerable code introduced later in development version)
https://github.com/gashasbi/My-Reports/tree/main/CVE-2024-36600
Introduced by: https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=4c840665c6d9cf2ff1cf0cd12f91b25030776c74 (master)
https://lists.gnu.org/archive/html/libcdio-devel/2024-04/msg00000.html

Search for package or bug name: Reporting problems