Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-6516 (GCVE-0-2025-6516)
Vulnerability from cvelistv5 – Published: 2025-06-23 17:00 – Updated: 2025-06-23 17:40| URL | Tags |
|---|---|
| https://vuldb.com/?id.313636 | vdb-entrytechnical-description |
| https://vuldb.com/?ctiid.313636 | signaturepermissions-required |
| https://vuldb.com/?submit.592589 | third-party-advisory |
| https://github.com/HDFGroup/hdf5/issues/5581 | issue-tracking |
| https://github.com/user-attachments/files/2062685… | exploit |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6516",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-23T17:39:48.061949Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-23T17:40:18.086Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "HDF5",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.14.1"
},
{
"status": "affected",
"version": "1.14.2"
},
{
"status": "affected",
"version": "1.14.3"
},
{
"status": "affected",
"version": "1.14.4"
},
{
"status": "affected",
"version": "1.14.5"
},
{
"status": "affected",
"version": "1.14.6"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Rulkallos (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
},
{
"lang": "de",
"value": "In HDF5 bis 1.14.6 wurde eine kritische Schwachstelle gefunden. Das betrifft die Funktion H5F_addr_decode_len der Datei /hdf5/src/H5Fint.c. Durch Manipulation mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-23T17:00:17.189Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-313636 | HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.313636"
},
{
"name": "VDB-313636 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.313636"
},
{
"name": "Submit #592589 | HDF5 1.14.6 Heap-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.592589"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/HDFGroup/hdf5/issues/5581"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-06-23T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-06-23T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-06-23T14:23:40.000Z",
"value": "VulDB entry last update"
}
],
"title": "HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-6516",
"datePublished": "2025-06-23T17:00:17.189Z",
"dateReserved": "2025-06-23T12:18:36.816Z",
"dateUpdated": "2025-06-23T17:40:18.086Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-6516",
"date": "2026-05-14",
"epss": "0.00147",
"percentile": "0.34684"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6516\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2025-06-23T17:15:32.550\",\"lastModified\":\"2026-04-29T01:00:01.613\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad en HDF5 hasta la versi\u00f3n 1.14.6, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n H5F_addr_decode_len del archivo /hdf5/src/H5Fint.c. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer en el mont\u00f3n. Un ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":1.9,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"PROOF_OF_CONCEPT\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":4.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.1,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"},{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.14.6\",\"matchCriteriaId\":\"F9158517-069A-4BE6-98F2-EBFDE3437236\"}]}]}],\"references\":[{\"url\":\"https://github.com/HDFGroup/hdf5/issues/5581\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/user-attachments/files/20626851/reproduce.tar.gz\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://vuldb.com/?ctiid.313636\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?id.313636\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?submit.592589\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6516\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-23T17:39:48.061949Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-23T17:40:13.350Z\"}}], \"cna\": {\"title\": \"HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Rulkallos (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 4.3, \"vectorString\": \"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"HDF5\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.14.0\"}, {\"status\": \"affected\", \"version\": \"1.14.1\"}, {\"status\": \"affected\", \"version\": \"1.14.2\"}, {\"status\": \"affected\", \"version\": \"1.14.3\"}, {\"status\": \"affected\", \"version\": \"1.14.4\"}, {\"status\": \"affected\", \"version\": \"1.14.5\"}, {\"status\": \"affected\", \"version\": \"1.14.6\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-23T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2025-06-23T02:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2025-06-23T14:23:40.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.313636\", \"name\": \"VDB-313636 | HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.313636\", \"name\": \"VDB-313636 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.592589\", \"name\": \"Submit #592589 | HDF5 1.14.6 Heap-based Buffer Overflow\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/HDFGroup/hdf5/issues/5581\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://github.com/user-attachments/files/20626851/reproduce.tar.gz\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.\"}, {\"lang\": \"de\", \"value\": \"In HDF5 bis 1.14.6 wurde eine kritische Schwachstelle gefunden. Das betrifft die Funktion H5F_addr_decode_len der Datei /hdf5/src/H5Fint.c. Durch Manipulation mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"Heap-based Buffer Overflow\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"Memory Corruption\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2025-06-23T17:00:17.189Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6516\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-23T17:40:18.086Z\", \"dateReserved\": \"2025-06-23T12:18:36.816Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2025-06-23T17:00:17.189Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CNVD-2025-18644
Vulnerability from cnvd - Published: 2025-08-15目前厂商尚未发布升级程序修复该安全问题,详情见厂商官网: https://www.hdfgroup.org/
| Name | HDF5 HDF5 <=1.14.6 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-6516",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516"
}
},
"description": "HDF5\u662fHDF\u5f00\u6e90\u7684\u4e00\u4e2a\u5e93\u3002\n\nHDF5\u5b58\u5728\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eH5Fint.c\u6587\u4ef6\u4e2dH5F_addr_decode_len\u51fd\u6570\u672a\u80fd\u6b63\u786e\u9a8c\u8bc1\u8f93\u5165\u6570\u636e\u7684\u957f\u5ea6\u5927\u5c0f\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5c1a\u672a\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://www.hdfgroup.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-18644",
"openTime": "2025-08-15",
"products": {
"product": "HDF5 HDF5 \u003c=1.14.6"
},
"referenceLink": "https://github.com/HDFGroup/hdf5/issues/5581",
"serverity": "\u4e2d",
"submitTime": "2025-06-27",
"title": "HDF5\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
MSRC_CVE-2025-6516
Vulnerability from csaf_microsoft - Published: 2025-06-02 00:00 - Updated: 2025-09-03 22:29| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-1 | — | ||
| Unresolved product id: 17084-2 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6516 HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-6516.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow",
"tracking": {
"current_release_date": "2025-09-03T22:29:38.000Z",
"generator": {
"date": "2025-10-20T03:23:37.629Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-6516",
"initial_release_date": "2025-06-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-03T22:29:38.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 hdf5 1.14.4-1",
"product": {
"name": "cbl2 hdf5 1.14.4-1",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "azl3 hdf5 1.14.4.3-1",
"product": {
"name": "azl3 hdf5 1.14.4.3-1",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "hdf5"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 hdf5 1.14.4-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 hdf5 1.14.4.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6516",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "general",
"text": "VulDB",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17086-1",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6516 HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-6516.json"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "REASONABLE",
"scope": "UNCHANGED",
"temporalScore": 4.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
},
"products": [
"17086-1",
"17084-2"
]
}
],
"title": "HDF5 H5Fint.c H5F_addr_decode_len heap-based overflow"
}
]
}
FKIE_CVE-2025-6516
Vulnerability from fkie_nvd - Published: 2025-06-23 17:15 - Updated: 2026-04-29 01:007.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cna@vuldb.com | https://github.com/HDFGroup/hdf5/issues/5581 | Exploit, Issue Tracking, Third Party Advisory | |
| cna@vuldb.com | https://github.com/user-attachments/files/20626851/reproduce.tar.gz | Exploit | |
| cna@vuldb.com | https://vuldb.com/?ctiid.313636 | Permissions Required, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?id.313636 | Third Party Advisory, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?submit.592589 | Third Party Advisory, VDB Entry |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9158517-069A-4BE6-98F2-EBFDE3437236",
"versionEndIncluding": "1.14.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en HDF5 hasta la versi\u00f3n 1.14.6, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n H5F_addr_decode_len del archivo /hdf5/src/H5Fint.c. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer en el mont\u00f3n. Un ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"id": "CVE-2025-6516",
"lastModified": "2026-04-29T01:00:01.613",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"baseSeverity": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "PROOF_OF_CONCEPT",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
},
"published": "2025-06-23T17:15:32.550",
"references": [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/HDFGroup/hdf5/issues/5581"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.313636"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.313636"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.592589"
}
],
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-R9X6-P32F-JFM3
Vulnerability from github – Published: 2025-06-23 18:30 – Updated: 2025-06-23 18:30A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
{
"affected": [],
"aliases": [
"CVE-2025-6516"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-06-23T17:15:32Z",
"severity": "MODERATE"
},
"details": "A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.",
"id": "GHSA-r9x6-p32f-jfm3",
"modified": "2025-06-23T18:30:26Z",
"published": "2025-06-23T18:30:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516"
},
{
"type": "WEB",
"url": "https://github.com/HDFGroup/hdf5/issues/5581"
},
{
"type": "WEB",
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.313636"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.313636"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.592589"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
RHSA-2025:23731
Vulnerability from csaf_redhat - Published: 2025-12-22 00:43 - Updated: 2026-05-06 13:50A vulnerability was found in HDF5. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. Manipulation leads to a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in the H5C__reconstruct_cache_entry function of the H5Cimage.c file in HDF5. Input manipulation can occur, which leads to a heap-based buffer overflow. Exploitation of this vulnerability requires local system access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
|
A heap-based buffer overflow was found in HDF5. This flaw exists in the H5F_addr_decode_len function of the /hdf5/src/H5Fint.c file and may be triggered by input manipulation to the function. Local access is required to exploit this flaw.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "HDF5 with upstream fixes for CVE-2025-2310, CVE-2025-6269, CVE-2025-6516.",
"title": "Topic"
},
{
"category": "general",
"text": "RPM packages are internal build artifacts and not supported on their own.\nThey are only supported as part of the RHEL AI application image.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23731",
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "AIPCC-8004",
"url": "https://issues.redhat.com/browse/AIPCC-8004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23731.json"
}
],
"title": "Red Hat Security Advisory: RHEL AI 3.0 hdf5 security update",
"tracking": {
"current_release_date": "2026-05-06T13:50:42+00:00",
"generator": {
"date": "2026-05-06T13:50:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2025:23731",
"initial_release_date": "2025-12-22T00:43:34+00:00",
"revision_history": [
{
"date": "2025-12-22T00:43:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-22T00:43:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T13:50:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product": {
"name": "Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux_ai:3.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux AI"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.src",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.src",
"product_id": "hdf5-0:1.14.6-6.el9ai.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.src as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.src",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2310",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-03-14T22:00:49.264356+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2352651"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in HDF5. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. Manipulation leads to a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HDF5: HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-2310"
},
{
"category": "external",
"summary": "RHBZ#2352651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310"
},
{
"category": "external",
"summary": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md",
"url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.299723",
"url": "https://vuldb.com/?ctiid.299723"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.299723",
"url": "https://vuldb.com/?id.299723"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.514533",
"url": "https://vuldb.com/?submit.514533"
}
],
"release_date": "2025-03-14T21:00:09.852000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HDF5: HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow"
},
{
"cve": "CVE-2025-6269",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-06-19T17:00:52.433016+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373903"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the H5C__reconstruct_cache_entry function of the H5Cimage.c file in HDF5. Input manipulation can occur, which leads to a heap-based buffer overflow. Exploitation of this vulnerability requires local system access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hdf5: HDF5 heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6269"
},
{
"category": "external",
"summary": "RHBZ#2373903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6269"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/commit/7f27ba8c3a8483c3d7e5e2cb21fefb2c7563422d",
"url": "https://github.com/HDFGroup/hdf5/commit/7f27ba8c3a8483c3d7e5e2cb21fefb2c7563422d"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/issues/5579",
"url": "https://github.com/HDFGroup/hdf5/issues/5579"
},
{
"category": "external",
"summary": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz",
"url": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.313273",
"url": "https://vuldb.com/?ctiid.313273"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.313273",
"url": "https://vuldb.com/?id.313273"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.592587",
"url": "https://vuldb.com/?submit.592587"
}
],
"release_date": "2025-06-19T16:00:17.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hdf5: HDF5 heap-based overflow"
},
{
"cve": "CVE-2025-6516",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-06-23T18:00:54.694669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374364"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow was found in HDF5. This flaw exists in the H5F_addr_decode_len function of the /hdf5/src/H5Fint.c file and may be triggered by input manipulation to the function. Local access is required to exploit this flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hdf5: HDF5 heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6516"
},
{
"category": "external",
"summary": "RHBZ#2374364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/issues/5581",
"url": "https://github.com/HDFGroup/hdf5/issues/5581"
},
{
"category": "external",
"summary": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz",
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.313636",
"url": "https://vuldb.com/?ctiid.313636"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.313636",
"url": "https://vuldb.com/?id.313636"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.592589",
"url": "https://vuldb.com/?submit.592589"
}
],
"release_date": "2025-06-23T17:00:17.189000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hdf5: HDF5 heap-based overflow"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.