Description
A flaw has been found in OSGeo gdal up to 3.13.0dev-4. Affected by this vulnerability is the function SWSDfldsrch of the file frmts/hdf4/hdf-eos/SWapi.c. Executing a manipulation can lead to heap-based buffer overflow. The attack requires local access. The exploit has been published and may be used. Upgrading to version 3.13.0RC1 addresses this issue. This patch is called 3e04c0385630e4d42517046d9a4967dfccfeb7fd. The affected component should be upgraded.
Problem types
Product status
3.13.0RC1
Timeline
| 2026-05-09: | Advisory disclosed |
| 2026-05-09: | VulDB entry created |
| 2026-05-09: | VulDB entry last update |
Credits
biniam (VulDB User)
References
vuldb.com/vuln/362429 (VDB-362429 | OSGeo gdal SWapi.c SWSDfldsrch heap-based overflow)
vuldb.com/vuln/362429/cti (VDB-362429 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/808127 (Submit #808127 | OSGeo GDAL 3.13.0dev Out-of-Bounds Read)
github.com/OSGeo/gdal/issues/14398
github.com/biniamf/pocs/tree/main/gdal-swsdfldsrch_oob-read
github.com/...ommit/3e04c0385630e4d42517046d9a4967dfccfeb7fd
github.com/OSGeo/gdal/releases/tag/v3.13.0RC1
github.com/OSGeo/gdal/