{"id":"MGASA-2022-0137","summary":"Updated gdal packages fix security vulnerability","details":"GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in\nPCIDSK::CPCIDSKFile::ReadFromFile (called from\nPCIDSK::CPCIDSKSegment::ReadFromFile and\nPCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment). (CVE-2021-45943)\n","modified":"2026-02-04T02:48:07.997069Z","published":"2022-04-09T21:20:39Z","related":["CVE-2021-45943"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0137.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30256"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/P23E4DEHY5FJCR5VJ46I6TO32DT7Y3T4/"}],"affected":[{"package":{"name":"gdal","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/gdal?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.3-7.2.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0137.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}