CVE-2019-25050

NameCVE-2019-25050
DescriptionnetCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdal (PTS)bullseye (security), bullseye3.2.2+dfsg-2+deb11u2fixed
bookworm3.6.2+dfsg-1fixed
sid, trixie3.9.3+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdalsourcestretch(not affected)
gdalsourcebuster(not affected)
gdalsource(unstable)3.1.0+dfsg-1

Notes

[buster] - gdal <not-affected> (Vulnerable code not present)
[stretch] - gdal <not-affected> (Vulnerable code not present)
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-420.yaml
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-392.yaml
https://github.com/OSGeo/gdal/commit/767e3a56144f676ca738ef8f700e0e56035bd05a (v3.1.0RC1)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15143
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15156

Search for package or bug name: Reporting problems