Description
A vulnerability was identified in OSGeo gdal up to 3.13.0dev-4. This issue affects the function SWnentries of the file frmts/hdf4/hdf-eos/SWapi.c. Such manipulation of the argument DimensionName leads to heap-based buffer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. Upgrading to version 3.12.4RC1 is capable of addressing this issue. The name of the patch is 9491e794f1757f08063ea2f7a274ad2994afa636. It is advisable to upgrade the affected component.
Published: 2026-05-07
Score: 4.8 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A heap-based buffer overflow exists in the SWnentries function of OSGeo GDAL’s HDF-EOS module. The vulnerability is triggered by manipulating the DimensionName argument, allowing a locally running attacker to corrupt memory. If successful, this could result in a denial of service by crashing a GDAL process or other memory corruption effects. The weakness aligns with CWE-119 and CWE-122, indicating unsafe handling of buffer sizes and improper bounds checking.

Affected Systems

The flaw is present in OSGeo GDAL versions up to 3.13.0dev-4. It is fixed in release candidate 3.12.4RC1 via patch commit 9491e794f1757f08063e... No other vendors are affected.

Risk and Exploitability

The CVSS score of 4.8 classifies the vulnerability as moderate. EPSS data is not available, but the exploit is publicly available and was demonstrated via the active PoC referenced in GitHub. The attack vector is local, meaning the attacker must have the ability to run code on the host or use a local GDAL process. Because it is not listed in CISA’s KEV catalog, it is not known to be actively exploited in the wild, yet the presence of a public PoC warrants immediate remediation.

Generated by OpenCVE AI on May 7, 2026 at 21:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GDAL to 3.12.4RC1 or later to apply the official fix
  • If an upgrade is not immediately possible, deploy the patch commit 9491e794f1757f08063e... to the affected source
  • Validate or sanitize the DimensionName parameter before passing it to SWnentries to mitigate any remaining buffer misuse
  • Restrict local execution of GDAL tools to trusted users or environments to limit the opportunity for a local attacker to trigger the overflow

Generated by OpenCVE AI on May 7, 2026 at 21:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in OSGeo gdal up to 3.13.0dev-4. This issue affects the function SWnentries of the file frmts/hdf4/hdf-eos/SWapi.c. Such manipulation of the argument DimensionName leads to heap-based buffer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. Upgrading to version 3.12.4RC1 is capable of addressing this issue. The name of the patch is 9491e794f1757f08063ea2f7a274ad2994afa636. It is advisable to upgrade the affected component.
Title OSGeo gdal SWapi.c SWnentries heap-based overflow
First Time appeared Osgeo
Osgeo gdal
Weaknesses CWE-119
CWE-122
CPEs cpe:2.3:a:osgeo:gdal:*:*:*:*:*:*:*:*
Vendors & Products Osgeo
Osgeo gdal
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-07T19:53:07.538Z

Reserved: 2026-05-07T12:34:19.931Z

Link: CVE-2026-8086

cve-icon Vulnrichment

Updated: 2026-05-07T19:49:08.127Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T19:16:03.110

Modified: 2026-05-07T20:16:45.190

Link: CVE-2026-8086

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:15:11Z

Weaknesses