UBUNTU-CVE-2024-36600

Source
https://ubuntu.com/security/CVE-2024-36600
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36600.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-36600
Upstream
Downstream
Related
Published
2024-06-14T19:15:00Z
Modified
2026-02-04T03:56:16.874568Z
Severity
  • 8.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Buffer Overflow Vulnerability in libcdio 2.2.0 (fixed in 2.3.0) allows an attacker to execute arbitrary code via a crafted ISO 9660 image file.

References

Affected packages

Ubuntu:20.04:LTS
libcdio

Package

Name
libcdio
Purl
pkg:deb/ubuntu/libcdio@2.0.0-2ubuntu0.2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0-2ubuntu0.2

Affected versions

2.*
2.0.0-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.0.0-2ubuntu0.2",
            "binary_name": "libcdio-dev"
        },
        {
            "binary_version": "2.0.0-2ubuntu0.2",
            "binary_name": "libcdio-utils"
        },
        {
            "binary_version": "2.0.0-2ubuntu0.2",
            "binary_name": "libcdio18"
        },
        {
            "binary_version": "2.0.0-2ubuntu0.2",
            "binary_name": "libiso9660-11"
        },
        {
            "binary_version": "2.0.0-2ubuntu0.2",
            "binary_name": "libiso9660-dev"
        },
        {
            "binary_version": "2.0.0-2ubuntu0.2",
            "binary_name": "libudf-dev"
        },
        {
            "binary_version": "2.0.0-2ubuntu0.2",
            "binary_name": "libudf0"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36600.json"
Ubuntu:22.04:LTS
libcdio

Package

Name
libcdio
Purl
pkg:deb/ubuntu/libcdio@2.1.0-3ubuntu0.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0-3ubuntu0.2

Affected versions

2.*
2.1.0-2
2.1.0-2build1
2.1.0-3
2.1.0-3build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libcdio++-dev"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libcdio++1"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libcdio-dev"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libcdio-utils"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libcdio19"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libiso9660++-dev"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libiso9660++0"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libiso9660-11"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libiso9660-dev"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libudf-dev"
        },
        {
            "binary_version": "2.1.0-3ubuntu0.2",
            "binary_name": "libudf0"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36600.json"
Ubuntu:24.04:LTS
libcdio

Package

Name
libcdio
Purl
pkg:deb/ubuntu/libcdio@2.1.0-4.1ubuntu1.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0-4.1ubuntu1.2

Affected versions

2.*
2.1.0-4
2.1.0-4.1
2.1.0-4.1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libcdio++-dev"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libcdio++1t64"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libcdio-dev"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libcdio-utils"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libcdio19t64"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libiso9660++-dev"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libiso9660++0t64"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libiso9660-11t64"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libiso9660-dev"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libudf-dev"
        },
        {
            "binary_version": "2.1.0-4.1ubuntu1.2",
            "binary_name": "libudf0t64"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36600.json"
Ubuntu:Pro:14.04:LTS
libcdio

Package

Name
libcdio
Purl
pkg:deb/ubuntu/libcdio@0.83-4.1ubuntu1+esm3?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.83-4.1ubuntu1+esm3

Affected versions

0.*
0.83-4ubuntu1
0.83-4.1
0.83-4.1ubuntu1
0.83-4.1ubuntu1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libcdio-cdda-dev"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libcdio-cdda1"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libcdio-dev"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libcdio-paranoia-dev"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libcdio-paranoia1"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libcdio-utils"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libcdio13"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libiso9660-8"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libiso9660-dev"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libudf-dev"
        },
        {
            "binary_version": "0.83-4.1ubuntu1+esm3",
            "binary_name": "libudf0"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36600.json"
Ubuntu:Pro:16.04:LTS
libcdio

Package

Name
libcdio
Purl
pkg:deb/ubuntu/libcdio@0.83-4.2ubuntu1+esm3?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.83-4.2ubuntu1+esm3

Affected versions

0.*
0.83-4.2
0.83-4.2ubuntu1
0.83-4.2ubuntu1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libcdio-cdda-dev"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libcdio-cdda1"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libcdio-dev"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libcdio-paranoia-dev"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libcdio-paranoia1"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libcdio-utils"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libcdio13"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libiso9660-8"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libiso9660-dev"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libudf-dev"
        },
        {
            "binary_version": "0.83-4.2ubuntu1+esm3",
            "binary_name": "libudf0"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36600.json"
Ubuntu:Pro:18.04:LTS
libcdio

Package

Name
libcdio
Purl
pkg:deb/ubuntu/libcdio@1.0.0-2ubuntu2+esm2?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0-2ubuntu2+esm2

Affected versions

0.*
0.83-4.2ubuntu1
0.94-0.2
0.94-1
1.*
1.0.0-2
1.0.0-2ubuntu1
1.0.0-2ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.0.0-2ubuntu2+esm2",
            "binary_name": "libcdio-dev"
        },
        {
            "binary_version": "1.0.0-2ubuntu2+esm2",
            "binary_name": "libcdio-utils"
        },
        {
            "binary_version": "1.0.0-2ubuntu2+esm2",
            "binary_name": "libcdio17"
        },
        {
            "binary_version": "1.0.0-2ubuntu2+esm2",
            "binary_name": "libiso9660-10"
        },
        {
            "binary_version": "1.0.0-2ubuntu2+esm2",
            "binary_name": "libiso9660-dev"
        },
        {
            "binary_version": "1.0.0-2ubuntu2+esm2",
            "binary_name": "libudf-dev"
        },
        {
            "binary_version": "1.0.0-2ubuntu2+esm2",
            "binary_name": "libudf0"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-36600.json"