![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-17545
https://notcve.org/view.php?id=CVE-2019-17545
14 Oct 2019 — GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded. GDAL versiones hasta 3.0.1, presenta una vulnerabilidad de doble liberación de poolDestroy en la función OGRExpatRealloc en el archivo ogr/ogr_expat.cpp cuando se excede el umbral de 10 MB. • http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00022.html • CWE-415: Double Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-17546 – libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c
https://notcve.org/view.php?id=CVE-2019-17546
14 Oct 2019 — tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition. El archivo tif_getimage.c en LibTIFF versiones hasta 4.0.10, como es usado en GDAL hasta 3.0.1 y otros productos, presenta un desbordamiento de enteros que causa potencialmente un desbordamiento de búfer en la región heap de la memoria por medio de una imagen RGBA diseña... • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443 • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-3581
https://notcve.org/view.php?id=CVE-2005-3581
16 Nov 2005 — GDAL before 1.3.0-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime. • http://secunia.com/advisories/17427 •