Osgeo

Gdal

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 07.04.2025 00:00:00
  • Zuletzt bearbeitet 23.07.2025 15:15:30

Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker to cause a denial of service via the OGRSpatialReference::Release function. NOTE: the Supplier indicates that the report is invalid and could not be reproduced.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 01.01.2022 01:15:09
  • Zuletzt bearbeitet 21.11.2024 06:33:19

GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).

  • EPSS 0.13%
  • Veröffentlicht 20.07.2021 07:15:07
  • Zuletzt bearbeitet 21.11.2024 04:39:49

netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).

  • EPSS 2.39%
  • Veröffentlicht 14.10.2019 02:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:29

GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.

  • EPSS 0.4%
  • Veröffentlicht 14.10.2019 02:15:11
  • Zuletzt bearbeitet 20.12.2024 13:15:16

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.