No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 07 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in OSGeo gdal up to 3.13.0dev-4. This issue affects the function SWnentries of the file frmts/hdf4/hdf-eos/SWapi.c. Such manipulation of the argument DimensionName leads to heap-based buffer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. Upgrading to version 3.12.4RC1 is capable of addressing this issue. The name of the patch is 9491e794f1757f08063ea2f7a274ad2994afa636. It is advisable to upgrade the affected component. | |
| Title | OSGeo gdal SWapi.c SWnentries heap-based overflow | |
| First Time appeared |
Osgeo
Osgeo gdal |
|
| Weaknesses | CWE-119 CWE-122 |
|
| CPEs | cpe:2.3:a:osgeo:gdal:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Osgeo
Osgeo gdal |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-07T19:53:07.538Z
Reserved: 2026-05-07T12:34:19.931Z
Link: CVE-2026-8086
Updated: 2026-05-07T19:49:08.127Z
Status : Awaiting Analysis
Published: 2026-05-07T19:16:03.110
Modified: 2026-05-07T20:16:45.190
Link: CVE-2026-8086
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:15:11Z