First published: Fri Dec 31 2021(Updated: )
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gdal | <=2.4.0+dfsg-1 | 2.4.0+dfsg-1+deb10u1 3.2.2+dfsg-2+deb11u2 3.6.2+dfsg-1 3.7.2+dfsg-1 |
Osgeo Gdal | >=3.3.0<=3.4.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Oracle Spatial And Graph | =19c | |
Oracle Spatial And Graph | =21c | |
>=3.3.0<=3.4.0 | ||
=9.0 | ||
=10.0 | ||
=11.0 | ||
=34 | ||
=35 | ||
=19c | ||
=21c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-45943.
CVE-2021-45943 has a severity rating of medium with a CVSS score of 5.5.
The affected software includes GDAL versions 3.3.0 through 3.4.0.
The vulnerability is a heap-based buffer overflow in the PCIDSK::CPCIDSKFile::ReadFromFile function.
To fix CVE-2021-45943, update GDAL to version 3.4.1 or higher.