From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id B03B0158020 for ; Mon, 31 Oct 2022 02:09:07 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id A184BE0C07; Mon, 31 Oct 2022 01:45:31 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 941EAE07EE for ; Mon, 31 Oct 2022 01:10:41 +0000 (UTC) Received: from glsamakerdev.dev.gentoo.org (unknown [140.211.166.165]) by smtp.gentoo.org (Postfix) with ESMTP id CB7EA34058A for ; Mon, 31 Oct 2022 01:10:40 +0000 (UTC) Received: from [172.18.0.3] (unknown [172.18.0.3]) by glsamakerdev.dev.gentoo.org (Postfix) with ESMTP id 91ADD8D16A for ; Mon, 31 Oct 2022 01:10:40 +0000 (-00) Subject: [gentoo-announce] [ GLSA 202210-15 ] GDAL: Heap Buffer Overflow Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha512"; boundary="===============2665458286668349106==" From: glsamaker@gentoo.org To: gentoo-announce@lists.gentoo.org Reply-To: security@gentoo.org Date: Mon, 31 Oct 2022 01:10:40 -0000 Message-ID: <166717864059.9.4533636239398697958@90bb6a0775af> X-Archives-Salt: 5c0f114b-cfba-4bd8-b5ef-e1478d5fa0c0 X-Archives-Hash: f981d948603c11717bd7bb1fdd95b6ed --===============2665458286668349106== Content-Type: text/plain; charset="utf-8" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202210-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: GDAL: Heap Buffer Overflow Date: October 31, 2022 Bugs: #830370 ID: 202210-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A heap buffer overflow vulnerability has been found in GDAL which could result in denial of service. Background ========== GDAL is a geospatial data abstraction library. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 sci-libs/gdal < 3.4.1 >= 3.4.1 Description =========== GDAL does not sufficiently sanitize input when loading PCIDSK binary segments. Impact ====== Loading crafted PCIDSK data via GDAL could result in denial of service. Workaround ========== There is no known workaround at this time. Resolution ========== All GDAL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sci-libs/gdal-3.4.1" References ========== [ 1 ] CVE-2021-45943 https://nvd.nist.gov/vuln/detail/CVE-2021-45943 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202210-15 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --===============2665458286668349106== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmNfIJAACgkQFMQkOaVy +9kFZhAAnFDPqs85+duzF0AU7BUpRl72k6c5dua8N2DMLpCftzXUYyaxSZp4jt4i HneJnrEc8ZH2lzEbTv+VKuRZhVBWin/mGwb1W0c4mUKf/+0YBNcGh585B9Zpfucg mf/nkWM08+SLWUrBLNYCe4R4GQNiDKvtYiRSrg0sbk5ykbyvraYD2g1+y9ftJM+F qgKoYkEsMtinUrlR8GnfTxC/Wsh07V1by9kOeHeiCsaXpnfA1WYzwJbbuxjmFbsc JVA6e6z+1EKx4q7xLywvqeakxFT7TfZqfHO7THVvi0qLzUClC+AO6YiHKpBKr3kJ R52uEcQZ6sW8g22mDgyLQmpTs/Frk41+17ssB66g44TX4M3ShG576tJcIilf4ZYR ogqQ6H23oIBf1zG81aCM4oW+gwfbM35AAIRMdAOzLuVCYqELh6o9uFVJMRqcZdVq d6BPR1HdxMgAs0UPeMQVsfmDvla5RPmT7RseaUVqERTGZa96X7P0UGFYx68kAmCN MAMRYfcyD7JV4v3pCXSlnwaqkhOi+9+MmKxCmP2FWzMlLjiQPJPyQCG8pWmJ7HZH oCM/ul4AhxT3bOWmzA9s+2MF/pouEVEFsmv+7qs/NUMtU41Ff9it95MHWJ24bUyI Mfbx/Qa8L8UiWesHxSZ9blmOTrE68fiSf88IPEp4SCRnRdDreT8= =9jek -----END PGP SIGNATURE----- --===============2665458286668349106==--