Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-2310 (GCVE-0-2025-2310)
Vulnerability from cvelistv5 – Published: 2025-03-14 21:00 – Updated: 2025-05-08 08:59| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2310",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-17T16:06:31.208611Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T16:20:19.740Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Metadata Attribute Decoder"
],
"product": "HDF5",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "1.14.6"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "NPU Unmanned Systems Safety Laboratory (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor plans to fix this issue in an upcoming release."
},
{
"lang": "de",
"value": "Eine kritische Schwachstelle wurde in HDF5 1.14.6 gefunden. Betroffen davon ist die Funktion H5MM_strndup der Komponente Metadata Attribute Decoder. Mittels Manipulieren mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-08T08:59:00.157Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-299723 | HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.299723"
},
{
"name": "VDB-299723 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.299723"
},
{
"name": "Submit #514533 | HDFGroup hdf5 v1.14.6 Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.514533"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-03-14T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-03-14T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-05-08T11:03:47.000Z",
"value": "VulDB entry last update"
}
],
"title": "HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-2310",
"datePublished": "2025-03-14T21:00:09.852Z",
"dateReserved": "2025-03-14T12:55:04.703Z",
"dateUpdated": "2025-05-08T08:59:00.157Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-2310",
"date": "2026-05-11",
"epss": "0.00051",
"percentile": "0.15681"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-2310\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2025-03-14T21:15:37.443\",\"lastModified\":\"2025-05-28T18:12:42.130\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor plans to fix this issue in an upcoming release.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad en HDF5 1.14.6, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n H5MM_strndup del componente Decodificador de Atributos de Metadatos. La manipulaci\u00f3n provoca un desbordamiento de b\u00fafer en el mont\u00f3n. Es necesario atacar localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre un conjunto de vulnerabilidades. Su respuesta fue \\\"rechazar\\\" sin m\u00e1s explicaciones. No hemos recibido m\u00e1s detalles, ni siquiera despu\u00e9s de solicitar amablemente m\u00e1s detalles. Actualmente, asumimos que el proveedor desea \\\"disputar\\\" las entradas, por lo que est\u00e1n marcadas como tales hasta que se disponga de m\u00e1s informaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":4.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.1,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"},{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hdfgroup:hdf5:1.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"914439E4-D5A7-444C-A1C4-051519EFF7FA\"}]}]}],\"references\":[{\"url\":\"https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?ctiid.299723\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?id.299723\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?submit.514533\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-2310\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-17T16:06:31.208611Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-17T16:06:37.552Z\"}}], \"cna\": {\"title\": \"HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"NPU Unmanned Systems Safety Laboratory (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 4.3, \"vectorString\": \"AV:L/AC:L/Au:S/C:P/I:P/A:P\"}}], \"affected\": [{\"vendor\": \"n/a\", \"modules\": [\"Metadata Attribute Decoder\"], \"product\": \"HDF5\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.14.6\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-03-14T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2025-03-14T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2025-05-08T11:03:47.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.299723\", \"name\": \"VDB-299723 | HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.299723\", \"name\": \"VDB-299723 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.514533\", \"name\": \"Submit #514533 | HDFGroup hdf5 v1.14.6 Buffer Overflow\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor plans to fix this issue in an upcoming release.\"}, {\"lang\": \"de\", \"value\": \"Eine kritische Schwachstelle wurde in HDF5 1.14.6 gefunden. Betroffen davon ist die Funktion H5MM_strndup der Komponente Metadata Attribute Decoder. Mittels Manipulieren mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"Heap-based Buffer Overflow\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"Memory Corruption\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2025-05-08T08:59:00.157Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-2310\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-08T08:59:00.157Z\", \"dateReserved\": \"2025-03-14T12:55:04.703Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2025-03-14T21:00:09.852Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CNVD-2025-18668
Vulnerability from cnvd - Published: 2025-08-15目前厂商尚未发布升级程序修复该安全问题,详情见厂商官网: https://www.hdfgroup.org/
| Name | HDF5 HDF5 1.14.6 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-2310",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310"
}
},
"description": "HDF5\u662fHDF\u5f00\u6e90\u7684\u4e00\u4e2a\u5e93\u3002\n\nHDF5\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eH5MM_strndup\u51fd\u6570\u672a\u80fd\u6b63\u786e\u9a8c\u8bc1\u8f93\u5165\u6570\u636e\u7684\u957f\u5ea6\u5927\u5c0f\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5c1a\u672a\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://www.hdfgroup.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-18668",
"openTime": "2025-08-15",
"products": {
"product": "HDF5 HDF5 1.14.6"
},
"referenceLink": "https://vuldb.com/?ctiid.299723",
"serverity": "\u4e2d",
"submitTime": "2025-03-27",
"title": "HDF5 H5MM_strndup\u51fd\u6570\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
GHSA-QXWF-XJ2V-QM83
Vulnerability from github – Published: 2025-03-14 21:31 – Updated: 2025-03-14 21:31A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about a batch of vulnerabilities. His response was "reject" without further explanation. We have not received an elaboration even after asking politely for further details. Currently we assume that the vendor wants to "dispute" the entries which is why they are flagged as such until further details become available.
{
"affected": [],
"aliases": [
"CVE-2025-2310"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-14T21:15:37Z",
"severity": "MODERATE"
},
"details": "A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about a batch of vulnerabilities. His response was \"reject\" without further explanation. We have not received an elaboration even after asking politely for further details. Currently we assume that the vendor wants to \"dispute\" the entries which is why they are flagged as such until further details become available.",
"id": "GHSA-qxwf-xj2v-qm83",
"modified": "2025-03-14T21:31:40Z",
"published": "2025-03-14T21:31:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310"
},
{
"type": "WEB",
"url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.299723"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.299723"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.514533"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
FKIE_CVE-2025-2310
Vulnerability from fkie_nvd - Published: 2025-03-14 21:15 - Updated: 2025-05-28 18:127.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cna@vuldb.com | https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md | Exploit, Third Party Advisory | |
| cna@vuldb.com | https://vuldb.com/?ctiid.299723 | Permissions Required, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?id.299723 | Third Party Advisory, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?submit.514533 | Third Party Advisory, VDB Entry |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hdfgroup:hdf5:1.14.6:*:*:*:*:*:*:*",
"matchCriteriaId": "914439E4-D5A7-444C-A1C4-051519EFF7FA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor plans to fix this issue in an upcoming release."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en HDF5 1.14.6, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n H5MM_strndup del componente Decodificador de Atributos de Metadatos. La manipulaci\u00f3n provoca un desbordamiento de b\u00fafer en el mont\u00f3n. Es necesario atacar localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre un conjunto de vulnerabilidades. Su respuesta fue \"rechazar\" sin m\u00e1s explicaciones. No hemos recibido m\u00e1s detalles, ni siquiera despu\u00e9s de solicitar amablemente m\u00e1s detalles. Actualmente, asumimos que el proveedor desea \"disputar\" las entradas, por lo que est\u00e1n marcadas como tales hasta que se disponga de m\u00e1s informaci\u00f3n."
}
],
"id": "CVE-2025-2310",
"lastModified": "2025-05-28T18:12:42.130",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
},
"published": "2025-03-14T21:15:37.443",
"references": [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.299723"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.299723"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.514533"
}
],
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
MSRC_CVE-2025-2310
Vulnerability from csaf_microsoft - Published: 2025-03-02 00:00 - Updated: 2026-01-08 14:39| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17741-17084 | — | ||
| Unresolved product id: 17336-17086 | — | ||
| Unresolved product id: 20762-17086 | — | ||
| Unresolved product id: 20755-17084 | — |
| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-2310 HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-2310.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow",
"tracking": {
"current_release_date": "2026-01-08T14:39:11.000Z",
"generator": {
"date": "2026-02-18T15:05:13.449Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-2310",
"initial_release_date": "2025-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-04T01:09:05.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-16T01:35:24.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-12-20T01:36:06.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2025-12-31T14:35:33.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-01-08T14:39:11.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 hdf5 1.14.4.3-1",
"product": {
"name": "\u003cazl3 hdf5 1.14.4.3-1",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 hdf5 1.14.4.3-1",
"product": {
"name": "azl3 hdf5 1.14.4.3-1",
"product_id": "17741"
}
},
{
"category": "product_version_range",
"name": "cbl2 hdf5 1.14.4-1",
"product": {
"name": "cbl2 hdf5 1.14.4-1",
"product_id": "3"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 hdf5 1.14.4-1",
"product": {
"name": "\u003ccbl2 hdf5 1.14.4-1",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "cbl2 hdf5 1.14.4-1",
"product": {
"name": "cbl2 hdf5 1.14.4-1",
"product_id": "17336"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 hdf5 1.14.6-1",
"product": {
"name": "\u003ccbl2 hdf5 1.14.6-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 hdf5 1.14.6-1",
"product": {
"name": "cbl2 hdf5 1.14.6-1",
"product_id": "20762"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 hdf5 1.14.6-1",
"product": {
"name": "\u003cazl3 hdf5 1.14.6-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 hdf5 1.14.6-1",
"product": {
"name": "azl3 hdf5 1.14.6-1",
"product_id": "20755"
}
}
],
"category": "product_name",
"name": "hdf5"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 hdf5 1.14.4.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 hdf5 1.14.4.3-1 as a component of Azure Linux 3.0",
"product_id": "17741-17084"
},
"product_reference": "17741",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 hdf5 1.14.4-1 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 hdf5 1.14.4-1 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 hdf5 1.14.4-1 as a component of CBL Mariner 2.0",
"product_id": "17336-17086"
},
"product_reference": "17336",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 hdf5 1.14.6-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 hdf5 1.14.6-1 as a component of CBL Mariner 2.0",
"product_id": "20762-17086"
},
"product_reference": "20762",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 hdf5 1.14.6-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 hdf5 1.14.6-1 as a component of Azure Linux 3.0",
"product_id": "20755-17084"
},
"product_reference": "20755",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2310",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "general",
"text": "VulDB",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17741-17084",
"17336-17086",
"20762-17086",
"20755-17084"
],
"known_affected": [
"17084-4",
"17086-3",
"17086-5",
"17086-1",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-2310 HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-2310.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2025-09-04T01:09:05.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-3"
]
},
{
"category": "vendor_fix",
"date": "2025-09-04T01:09:05.000Z",
"details": "1.14.6-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-4",
"17086-5",
"17086-1",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"17084-4",
"17086-3",
"17086-5",
"17086-1",
"17084-2"
]
}
],
"title": "HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow"
}
]
}
RHSA-2025:23731
Vulnerability from csaf_redhat - Published: 2025-12-22 00:43 - Updated: 2026-05-06 13:50A vulnerability was found in HDF5. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. Manipulation leads to a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in the H5C__reconstruct_cache_entry function of the H5Cimage.c file in HDF5. Input manipulation can occur, which leads to a heap-based buffer overflow. Exploitation of this vulnerability requires local system access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
A heap-based buffer overflow was found in HDF5. This flaw exists in the H5F_addr_decode_len function of the /hdf5/src/H5Fint.c file and may be triggered by input manipulation to the function. Local access is required to exploit this flaw.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "HDF5 with upstream fixes for CVE-2025-2310, CVE-2025-6269, CVE-2025-6516.",
"title": "Topic"
},
{
"category": "general",
"text": "RPM packages are internal build artifacts and not supported on their own.\nThey are only supported as part of the RHEL AI application image.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23731",
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "AIPCC-8004",
"url": "https://issues.redhat.com/browse/AIPCC-8004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23731.json"
}
],
"title": "Red Hat Security Advisory: RHEL AI 3.0 hdf5 security update",
"tracking": {
"current_release_date": "2026-05-06T13:50:42+00:00",
"generator": {
"date": "2026-05-06T13:50:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2025:23731",
"initial_release_date": "2025-12-22T00:43:34+00:00",
"revision_history": [
{
"date": "2025-12-22T00:43:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-22T00:43:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T13:50:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product": {
"name": "Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux_ai:3.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux AI"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.src",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.src",
"product_id": "hdf5-0:1.14.6-6.el9ai.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.src as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.src",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2310",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-03-14T22:00:49.264356+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2352651"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in HDF5. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. Manipulation leads to a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HDF5: HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-2310"
},
{
"category": "external",
"summary": "RHBZ#2352651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310"
},
{
"category": "external",
"summary": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md",
"url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.299723",
"url": "https://vuldb.com/?ctiid.299723"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.299723",
"url": "https://vuldb.com/?id.299723"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.514533",
"url": "https://vuldb.com/?submit.514533"
}
],
"release_date": "2025-03-14T21:00:09.852000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HDF5: HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow"
},
{
"cve": "CVE-2025-6269",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-06-19T17:00:52.433016+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373903"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the H5C__reconstruct_cache_entry function of the H5Cimage.c file in HDF5. Input manipulation can occur, which leads to a heap-based buffer overflow. Exploitation of this vulnerability requires local system access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hdf5: HDF5 heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6269"
},
{
"category": "external",
"summary": "RHBZ#2373903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6269"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/commit/7f27ba8c3a8483c3d7e5e2cb21fefb2c7563422d",
"url": "https://github.com/HDFGroup/hdf5/commit/7f27ba8c3a8483c3d7e5e2cb21fefb2c7563422d"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/issues/5579",
"url": "https://github.com/HDFGroup/hdf5/issues/5579"
},
{
"category": "external",
"summary": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz",
"url": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.313273",
"url": "https://vuldb.com/?ctiid.313273"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.313273",
"url": "https://vuldb.com/?id.313273"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.592587",
"url": "https://vuldb.com/?submit.592587"
}
],
"release_date": "2025-06-19T16:00:17.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hdf5: HDF5 heap-based overflow"
},
{
"cve": "CVE-2025-6516",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-06-23T18:00:54.694669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374364"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow was found in HDF5. This flaw exists in the H5F_addr_decode_len function of the /hdf5/src/H5Fint.c file and may be triggered by input manipulation to the function. Local access is required to exploit this flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hdf5: HDF5 heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6516"
},
{
"category": "external",
"summary": "RHBZ#2374364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/issues/5581",
"url": "https://github.com/HDFGroup/hdf5/issues/5581"
},
{
"category": "external",
"summary": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz",
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.313636",
"url": "https://vuldb.com/?ctiid.313636"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.313636",
"url": "https://vuldb.com/?id.313636"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.592589",
"url": "https://vuldb.com/?submit.592589"
}
],
"release_date": "2025-06-23T17:00:17.189000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hdf5: HDF5 heap-based overflow"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.