Your submission was sent successfully! Close

CVE-2019-17545

Published: 14 October 2019

GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.

From the Ubuntu security team

It was discovered that GDAL incorrectly handled memory allocation. An attacker could possibly use this issue to cause denial of service or other unspecified impact.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
gdal
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Not vulnerable
(2.4.2+dfsg-2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.4.2+dfsg-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.4.2+dfsg-2)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Needed