CVE-2021-45943

GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).
References
Link Resource
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993 Exploit Issue Tracking Mailing List Patch Third Party Advisory
https://github.com/OSGeo/gdal/commit/1ca6a3e5168c200763fa46d8aa7e698d0b757e7e Patch Third Party Advisory
https://github.com/OSGeo/gdal/pull/4944 Exploit Patch Third Party Advisory
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2021-1651.yaml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00004.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00040.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBPJGXY7IYY65NVJBLP3RONXE7ZBVCNU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P23E4DEHY5FJCR5VJ46I6TO32DT7Y3T4/
https://security.gentoo.org/glsa/202210-15 Third Party Advisory
https://www.debian.org/security/2022/dsa-5239 Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993 Exploit Issue Tracking Mailing List Patch Third Party Advisory
https://github.com/OSGeo/gdal/commit/1ca6a3e5168c200763fa46d8aa7e698d0b757e7e Patch Third Party Advisory
https://github.com/OSGeo/gdal/pull/4944 Exploit Patch Third Party Advisory
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2021-1651.yaml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00004.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00040.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBPJGXY7IYY65NVJBLP3RONXE7ZBVCNU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P23E4DEHY5FJCR5VJ46I6TO32DT7Y3T4/
https://security.gentoo.org/glsa/202210-15 Third Party Advisory
https://www.debian.org/security/2022/dsa-5239 Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:osgeo:gdal:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:spatial_and_graph:19c:*:*:*:*:*:*:*
cpe:2.3:a:oracle:spatial_and_graph:21c:*:*:*:*:*:*:*

History

21 Nov 2024, 06:33

Type Values Removed Values Added
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993 - Exploit, Issue Tracking, Mailing List, Patch, Third Party Advisory () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993 - Exploit, Issue Tracking, Mailing List, Patch, Third Party Advisory
References () https://github.com/OSGeo/gdal/commit/1ca6a3e5168c200763fa46d8aa7e698d0b757e7e - Patch, Third Party Advisory () https://github.com/OSGeo/gdal/commit/1ca6a3e5168c200763fa46d8aa7e698d0b757e7e - Patch, Third Party Advisory
References () https://github.com/OSGeo/gdal/pull/4944 - Exploit, Patch, Third Party Advisory () https://github.com/OSGeo/gdal/pull/4944 - Exploit, Patch, Third Party Advisory
References () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2021-1651.yaml - Third Party Advisory () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2021-1651.yaml - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/01/msg00004.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/01/msg00004.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/09/msg00040.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/09/msg00040.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBPJGXY7IYY65NVJBLP3RONXE7ZBVCNU/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBPJGXY7IYY65NVJBLP3RONXE7ZBVCNU/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P23E4DEHY5FJCR5VJ46I6TO32DT7Y3T4/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P23E4DEHY5FJCR5VJ46I6TO32DT7Y3T4/ -
References () https://security.gentoo.org/glsa/202210-15 - Third Party Advisory () https://security.gentoo.org/glsa/202210-15 - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5239 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5239 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory

07 Nov 2023, 03:39

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P23E4DEHY5FJCR5VJ46I6TO32DT7Y3T4/', 'name': 'FEDORA-2022-cffca5dbf4', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBPJGXY7IYY65NVJBLP3RONXE7ZBVCNU/', 'name': 'FEDORA-2022-e85e37206b', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P23E4DEHY5FJCR5VJ46I6TO32DT7Y3T4/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBPJGXY7IYY65NVJBLP3RONXE7ZBVCNU/ -

Information

Published : 2022-01-01 01:15

Updated : 2024-11-21 06:33


NVD link : CVE-2021-45943

Mitre link : CVE-2021-45943

CVE.ORG link : CVE-2021-45943


JSON object : View

Products Affected

debian

  • debian_linux

oracle

  • spatial_and_graph

fedoraproject

  • fedora

osgeo

  • gdal
CWE
CWE-787

Out-of-bounds Write