RHSA-2025:23731
Vulnerability from csaf_redhat - Published: 2025-12-22 00:43 - Updated: 2025-12-22 06:08Summary
Red Hat Security Advisory: RHEL AI 3.0 hdf5 security update
Notes
Topic
HDF5 with upstream fixes for CVE-2025-2310, CVE-2025-6269, CVE-2025-6516.
Details
RPM packages are internal build artifacts and not supported on their own.
They are only supported as part of the RHEL AI application image.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "HDF5 with upstream fixes for CVE-2025-2310, CVE-2025-6269, CVE-2025-6516.",
"title": "Topic"
},
{
"category": "general",
"text": "RPM packages are internal build artifacts and not supported on their own.\nThey are only supported as part of the RHEL AI application image.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23731",
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "AIPCC-8004",
"url": "https://issues.redhat.com/browse/AIPCC-8004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23731.json"
}
],
"title": "Red Hat Security Advisory: RHEL AI 3.0 hdf5 security update",
"tracking": {
"current_release_date": "2025-12-22T06:08:42+00:00",
"generator": {
"date": "2025-12-22T06:08:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:23731",
"initial_release_date": "2025-12-22T00:43:34+00:00",
"revision_history": [
{
"date": "2025-12-22T00:43:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-22T00:43:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-22T06:08:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product": {
"name": "Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux_ai:3.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux AI"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.src",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.src",
"product_id": "hdf5-0:1.14.6-6.el9ai.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-static@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-6.el9ai?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_id": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-6.el9ai?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.src as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.src",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-devel-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.aarch64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.ppc64le as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.s390x as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.s390x",
"relates_to_product_reference": "9Base-RHELAI-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hdf5-static-0:1.14.6-6.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 3.0 for RHEL 9",
"product_id": "9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
},
"product_reference": "hdf5-static-0:1.14.6-6.el9ai.x86_64",
"relates_to_product_reference": "9Base-RHELAI-3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2310",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-03-14T22:00:49.264356+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2352651"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in HDF5. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. Manipulation leads to a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HDF5: HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-2310"
},
{
"category": "external",
"summary": "RHBZ#2352651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2310"
},
{
"category": "external",
"summary": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md",
"url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.299723",
"url": "https://vuldb.com/?ctiid.299723"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.299723",
"url": "https://vuldb.com/?id.299723"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.514533",
"url": "https://vuldb.com/?submit.514533"
}
],
"release_date": "2025-03-14T21:00:09.852000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HDF5: HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow"
},
{
"cve": "CVE-2025-6269",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-06-19T17:00:52.433016+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373903"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the H5C__reconstruct_cache_entry function of the H5Cimage.c file in HDF5. Input manipulation can occur, which leads to a heap-based buffer overflow. Exploitation of this vulnerability requires local system access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hdf5: HDF5 heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6269"
},
{
"category": "external",
"summary": "RHBZ#2373903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6269"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/commit/7f27ba8c3a8483c3d7e5e2cb21fefb2c7563422d",
"url": "https://github.com/HDFGroup/hdf5/commit/7f27ba8c3a8483c3d7e5e2cb21fefb2c7563422d"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/issues/5579",
"url": "https://github.com/HDFGroup/hdf5/issues/5579"
},
{
"category": "external",
"summary": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz",
"url": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.313273",
"url": "https://vuldb.com/?ctiid.313273"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.313273",
"url": "https://vuldb.com/?id.313273"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.592587",
"url": "https://vuldb.com/?submit.592587"
}
],
"release_date": "2025-06-19T16:00:17.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hdf5: HDF5 heap-based overflow"
},
{
"cve": "CVE-2025-6516",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-06-23T18:00:54.694669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374364"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow was found in HDF5. This flaw exists in the H5F_addr_decode_len function of the /hdf5/src/H5Fint.c file and may be triggered by input manipulation to the function. Local access is required to exploit this flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hdf5: HDF5 heap-based overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6516"
},
{
"category": "external",
"summary": "RHBZ#2374364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6516"
},
{
"category": "external",
"summary": "https://github.com/HDFGroup/hdf5/issues/5581",
"url": "https://github.com/HDFGroup/hdf5/issues/5581"
},
{
"category": "external",
"summary": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz",
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz"
},
{
"category": "external",
"summary": "https://vuldb.com/?ctiid.313636",
"url": "https://vuldb.com/?ctiid.313636"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.313636",
"url": "https://vuldb.com/?id.313636"
},
{
"category": "external",
"summary": "https://vuldb.com/?submit.592589",
"url": "https://vuldb.com/?submit.592589"
}
],
"release_date": "2025-06-23T17:00:17.189000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-22T00:43:34+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23731"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.src",
"9Base-RHELAI-3.0:hdf5-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-debugsource-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-debuginfo-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-devel-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-openmpi-static-0:1.14.6-6.el9ai.x86_64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.aarch64",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.ppc64le",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.s390x",
"9Base-RHELAI-3.0:hdf5-static-0:1.14.6-6.el9ai.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hdf5: HDF5 heap-based overflow"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…