Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-2923

Опубликовано: 28 мар. 2025
Источник: debian

Описание

A vulnerability, which was classified as problematic, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5F_addr_encode_len of the file src/H5Fint.c. The manipulation of the argument pp leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hdf5unfixedpackage

Примечания

  • https://github.com/HDFGroup/hdf5/issues/5381

  • https://github.com/HDFGroup/hdf5/pull/5829

  • https://github.com/HDFGroup/hdf5/commit/29c847a43db0cdc85b01cafa5a7613ea73932675

  • HDF not covered by security support, see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117722

Связанные уязвимости

CVSS3: 3.3
ubuntu
11 месяцев назад

A vulnerability, which was classified as problematic, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5F_addr_encode_len of the file src/H5Fint.c. The manipulation of the argument pp leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
nvd
11 месяцев назад

A vulnerability, which was classified as problematic, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5F_addr_encode_len of the file src/H5Fint.c. The manipulation of the argument pp leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
msrc
5 месяцев назад

HDF5 H5Fint.c H5F_addr_encode_len heap-based overflow

CVSS3: 3.3
github
11 месяцев назад

A vulnerability, which was classified as problematic, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5F_addr_encode_len of the file src/H5Fint.c. The manipulation of the argument pp leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.