Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-6857

Опубликовано: 29 июн. 2025
Источник: ubuntu
Приоритет: low
CVSS2: 1.7
CVSS3: 3.3

Описание

A vulnerability has been found in HDF5 1.14.6 and classified as problematic. Affected by this vulnerability is the function H5G__node_cmp3 of the file src/H5Gnode.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

РелизСтатусПримечание
devel

needed

esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

needed

esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

jammy

needed

noble

needed

oracular

ignored

end of life, was needs-triage

Показывать по

1.7 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
7 месяцев назад

A vulnerability has been found in HDF5 1.14.6 and classified as problematic. Affected by this vulnerability is the function H5G__node_cmp3 of the file src/H5Gnode.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
nvd
7 месяцев назад

A vulnerability has been found in HDF5 1.14.6 and classified as problematic. Affected by this vulnerability is the function H5G__node_cmp3 of the file src/H5Gnode.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
msrc
5 месяцев назад

HDF5 H5Gnode.c H5G__node_cmp3 stack-based overflow

CVSS3: 3.3
debian
7 месяцев назад

A vulnerability has been found in HDF5 1.14.6 and classified as proble ...

CVSS3: 3.3
github
7 месяцев назад

A vulnerability has been found in HDF5 1.14.6 and classified as problematic. Affected by this vulnerability is the function H5G__node_cmp3 of the file src/H5Gnode.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

1.7 Low

CVSS2

3.3 Low

CVSS3