Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-2926

Опубликовано: 28 мар. 2025
Источник: ubuntu
Приоритет: medium
CVSS2: 1.7
CVSS3: 3.3

Описание

A vulnerability was found in HDF5 up to 1.14.6 and classified as problematic. This issue affects the function H5O__cache_chk_serialize of the file src/H5Ocache.c. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

РелизСтатусПримечание
devel

needed

esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

needed

esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

ignored

end of standard support, was needs-triage
jammy

needed

noble

needed

Показывать по

1.7 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
11 месяцев назад

A vulnerability was found in HDF5 up to 1.14.6 and classified as problematic. This issue affects the function H5O__cache_chk_serialize of the file src/H5Ocache.c. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
nvd
11 месяцев назад

A vulnerability was found in HDF5 up to 1.14.6 and classified as problematic. This issue affects the function H5O__cache_chk_serialize of the file src/H5Ocache.c. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
msrc
5 месяцев назад

HDF5 H5Ocache.c H5O__cache_chk_serialize null pointer dereference

CVSS3: 3.3
debian
11 месяцев назад

A vulnerability was found in HDF5 up to 1.14.6 and classified as probl ...

CVSS3: 3.3
github
11 месяцев назад

A vulnerability was found in HDF5 up to 1.14.6 and classified as problematic. This issue affects the function H5O__cache_chk_serialize of the file src/H5Ocache.c. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

1.7 Low

CVSS2

3.3 Low

CVSS3