CVE-2025-29480
- EPSS 0.02%
- Published 07.04.2025 00:00:00
- Last modified 23.07.2025 15:15:30
Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker to cause a denial of service via the OGRSpatialReference::Release function. NOTE: the Supplier indicates that the report is invalid and could not be reproduced.
CVE-2021-45943
- EPSS 0.08%
- Published 01.01.2022 01:15:09
- Last modified 21.11.2024 06:33:19
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).
CVE-2019-25050
- EPSS 0.13%
- Published 20.07.2021 07:15:07
- Last modified 21.11.2024 04:39:49
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
CVE-2019-17545
- EPSS 2.39%
- Published 14.10.2019 02:15:11
- Last modified 21.11.2024 04:32:29
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
CVE-2019-17546
- EPSS 0.4%
- Published 14.10.2019 02:15:11
- Last modified 20.12.2024 13:15:16
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.