Name | CVE-2019-25050 |
Description | netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
gdal (PTS) | bullseye (security), bullseye | 3.2.2+dfsg-2+deb11u2 | fixed |
| bookworm | 3.6.2+dfsg-1 | fixed |
| sid, trixie | 3.9.3+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
gdal | source | stretch | (not affected) | | | |
gdal | source | buster | (not affected) | | | |
gdal | source | (unstable) | 3.1.0+dfsg-1 | | | |
Notes
[buster] - gdal <not-affected> (Vulnerable code not present)
[stretch] - gdal <not-affected> (Vulnerable code not present)
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-420.yaml
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-392.yaml
https://github.com/OSGeo/gdal/commit/767e3a56144f676ca738ef8f700e0e56035bd05a (v3.1.0RC1)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15143
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15156