4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.2 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
49.1%
Debian Security Advisory DSA-5239-1 [email protected]
https://www.debian.org/security/ Aron Xu
September 27, 2022 https://www.debian.org/security/faq
Package : gdal
CVE ID : CVE-2021-45943
A heap-based buffer overflow vulnerability was discovered in gdal, a
Geospatial Data Abstraction Library, which could result in denial of
service or potentially the execution of arbitrary code, if a specially
crafted file is processed with the PCIDSK driver.
For the stable distribution (bullseye), this problem has been fixed in
version 3.2.2+dfsg-2+deb11u2.
We recommend that you upgrade your gdal packages.
For the detailed security status of gdal please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/gdal
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | armhf | gdal-bin | < 2.4.0+dfsg-1+deb10u1 | gdal-bin_2.4.0+dfsg-1+deb10u1_armhf.deb |
Debian | 9 | i386 | gdal-bin | < 2.1.2+dfsg-5+deb9u1 | gdal-bin_2.1.2+dfsg-5+deb9u1_i386.deb |
Debian | 10 | amd64 | libgdal20 | < 2.4.0+dfsg-1+deb10u1 | libgdal20_2.4.0+dfsg-1+deb10u1_amd64.deb |
Debian | 11 | armhf | libgdal-dev | < 3.2.2+dfsg-2+deb11u2 | libgdal-dev_3.2.2+dfsg-2+deb11u2_armhf.deb |
Debian | 9 | all | gdal | < 2.1.2+dfsg-5+deb9u1 | gdal_2.1.2+dfsg-5+deb9u1_all.deb |
Debian | 10 | i386 | gdal-bin | < 2.4.0+dfsg-1+deb10u1 | gdal-bin_2.4.0+dfsg-1+deb10u1_i386.deb |
Debian | 11 | mips64el | gdal-bin | < 3.2.2+dfsg-2+deb11u2 | gdal-bin_3.2.2+dfsg-2+deb11u2_mips64el.deb |
Debian | 10 | amd64 | python-gdal | < 2.4.0+dfsg-1+deb10u1 | python-gdal_2.4.0+dfsg-1+deb10u1_amd64.deb |
Debian | 10 | arm64 | libgdal-perl | < 2.4.0+dfsg-1+deb10u1 | libgdal-perl_2.4.0+dfsg-1+deb10u1_arm64.deb |
Debian | 10 | armhf | python-gdal | < 2.4.0+dfsg-1+deb10u1 | python-gdal_2.4.0+dfsg-1+deb10u1_armhf.deb |
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.2 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
49.1%