CVE-2026-8086

medium

Description

A vulnerability was identified in OSGeo gdal up to 3.13.0dev-4. This issue affects the function SWnentries of the file frmts/hdf4/hdf-eos/SWapi.c. Such manipulation of the argument DimensionName leads to heap-based buffer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. Upgrading to version 3.12.4RC1 is capable of addressing this issue. The name of the patch is 9491e794f1757f08063ea2f7a274ad2994afa636. It is advisable to upgrade the affected component.

References

https://vuldb.com/vuln/361839/cti

https://vuldb.com/vuln/361839

https://vuldb.com/submit/808038

https://github.com/biniamf/pocs/tree/main/gdal-swinqdims_bof

https://github.com/OSGeo/gdal/releases/tag/v3.12.4RC1

https://github.com/OSGeo/gdal/pull/14361

https://github.com/OSGeo/gdal/issues/14356

https://github.com/OSGeo/gdal/commit/9491e794f1757f08063ea2f7a274ad2994afa636

https://github.com/OSGeo/gdal/

Details

Source: Mitre, NVD

Published: 2026-05-07

Updated: 2026-05-07

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

CVSS v4

Base Score: 4.8

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium