Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/gdal@3.12.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/gdal@3.12.3%2Bdfsg-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (6)
Vulnerability Summary Aliases
VCID-6v8p-cjhb-c7er netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). CVE-2019-25050
PYSEC-2021-888
VCID-a6w1-7txk-euay GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded. CVE-2019-17545
PYSEC-2019-241
VCID-gzm4-ajmq-sqgj GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment). BIT-gdal-2021-45943
CVE-2021-45943
PYSEC-2022-43065
VCID-nnvs-e9na-p7fu Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in a Denial of Service condition. CVE-2019-17546
VCID-usqv-s3dc-hkgk Multiple packages suffer from RUNPATH issues that may allow users in the "portage" group to escalate privileges. CVE-2005-3581
VCID-yghg-jnaz-xyaq Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in OSGeo gdal (frmts/zlib/contrib/infback9 modules). This vulnerability is associated with program files inftree9.C‎. This issue affects gdal: before 3.11.0. CVE-2026-4738

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:13:02.089790+00:00 Debian Importer Fixing VCID-nnvs-e9na-p7fu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:49.729216+00:00 Debian Importer Fixing VCID-gzm4-ajmq-sqgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:05.608482+00:00 Debian Importer Fixing VCID-6v8p-cjhb-c7er https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:50.144351+00:00 Debian Importer Fixing VCID-usqv-s3dc-hkgk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:31.225683+00:00 Debian Importer Fixing VCID-a6w1-7txk-euay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:21:24.606875+00:00 Debian Importer Fixing VCID-nnvs-e9na-p7fu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:14.502775+00:00 Debian Importer Fixing VCID-gzm4-ajmq-sqgj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:52.649533+00:00 Debian Importer Fixing VCID-6v8p-cjhb-c7er https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:28.260828+00:00 Debian Importer Fixing VCID-usqv-s3dc-hkgk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:49:18.134919+00:00 Debian Importer Fixing VCID-yghg-jnaz-xyaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:26.960003+00:00 Debian Importer Fixing VCID-a6w1-7txk-euay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:24:25.095898+00:00 Debian Importer Fixing VCID-gzm4-ajmq-sqgj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:24:25.053509+00:00 Debian Importer Fixing VCID-6v8p-cjhb-c7er https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:24:25.011329+00:00 Debian Importer Fixing VCID-nnvs-e9na-p7fu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:24:24.969467+00:00 Debian Importer Fixing VCID-a6w1-7txk-euay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:24:24.927342+00:00 Debian Importer Fixing VCID-usqv-s3dc-hkgk https://security-tracker.debian.org/tracker/data/json 38.1.0