Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2021-45943

Disclosure Date: January 01, 2022 (last updated February 23, 2025)
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).
Attacker Value
Unknown

CVE-2019-25050

Disclosure Date: July 20, 2021 (last updated February 23, 2025)
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
Attacker Value
Unknown

CVE-2019-17545

Disclosure Date: October 14, 2019 (last updated November 08, 2023)
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
Attacker Value
Unknown

CVE-2019-17546

Disclosure Date: October 14, 2019 (last updated November 08, 2023)
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
Attacker Value
Unknown

CVE-2005-3581

Disclosure Date: November 16, 2005 (last updated February 22, 2025)
GDAL before 1.3.0-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.
0