Search for packages
| purl | pkg:deb/debian/gdal@1.6.3-4 |
| Next non-vulnerable version | 3.12.3+dfsg-1 |
| Latest non-vulnerable version | 3.12.3+dfsg-1 |
| Risk | 4.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6v8p-cjhb-c7er
Aliases: CVE-2019-25050 PYSEC-2021-888 |
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). |
Affected by 1 other vulnerability. |
|
VCID-a6w1-7txk-euay
Aliases: CVE-2019-17545 PYSEC-2019-241 |
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded. |
Affected by 1 other vulnerability. |
|
VCID-gzm4-ajmq-sqgj
Aliases: BIT-gdal-2021-45943 CVE-2021-45943 PYSEC-2022-43065 |
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment). |
Affected by 1 other vulnerability. |
|
VCID-nnvs-e9na-p7fu
Aliases: CVE-2019-17546 |
Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in a Denial of Service condition. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||