Medium severity5.3NVD Advisory· Published May 7, 2026· Updated May 8, 2026
CVE-2026-8087
CVE-2026-8087
Description
A security flaw has been discovered in OSGeo gdal up to 3.13.0dev-4. Impacted is the function GDnentries of the file frmts/hdf4/hdf-eos/GDapi.c. Performing a manipulation of the argument DataFieldName results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 3.13.0RC1 is recommended to address this issue. The patch is named 184f77dbcc74118c062c05e464c88161d3c37b9b. You should upgrade the affected component.
Affected products
4Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/OSGeo/gdal/commit/184f77dbcc74118c062c05e464c88161d3c37b9bnvdPatch
- github.com/OSGeo/gdal/issues/14363nvdExploitIssue TrackingPatchVendor Advisory
- github.com/biniamf/pocs/tree/main/gdal-gdinqfields_bofnvdExploitThird Party Advisory
- vuldb.com/submit/808039nvdExploitThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-h9rh-5ffh-h669ghsaADVISORY
- vuldb.com/vuln/361840nvdThird Party AdvisoryVDB Entry
- github.com/OSGeo/gdal/releases/tag/v3.13.0RC1nvdRelease Notes
- vuldb.com/vuln/361840/ctinvdPermissions RequiredVDB Entry
- nvd.nist.gov/vuln/detail/CVE-2026-8087ghsa
News mentions
0No linked articles in our index yet.