CVE-2024-36600

NameCVE-2024-36600
DescriptionBuffer Overflow Vulnerability in libcdio 2.2.0 (fixed in 2.3.0) allows an attacker to execute arbitrary code via a crafted ISO 9660 image file.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1129256

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcdio (PTS)bullseye2.1.0-2fixed
bookworm2.1.0-4fixed
forky, sid, trixie2.2.0-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcdiosourcebullseye(not affected)
libcdiosourcebookworm(not affected)
libcdiosource(unstable)(unfixed)1129256

Notes

[trixie] - libcdio <no-dsa> (Can be fixed via point release)
[bookworm] - libcdio <not-affected> (Vulnerable code not present)
[bullseye] - libcdio <not-affected> (Vulnerable code not present)
https://github.com/gashasbi/My-Reports/tree/main/CVE-2024-36600
Introduced by: https://github.com/libcdio/libcdio/commit/4c840665c6d9cf2ff1cf0cd12f91b25030776c74 (2.1.1)
https://github.com/libcdio/libcdio/pull/32
Fixed by: https://github.com/libcdio/libcdio/commit/417478a7474af41c27ab3f876f31783fa06a5dbc (2.2.1.rc1)
https://lists.gnu.org/archive/html/libcdio-devel/2024-04/msg00000.html
https://lists.gnu.org/archive/html/libcdio-devel/2024-05/msg00005.html

Search for package or bug name: Reporting problems