Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-32615 (GCVE-0-2024-32615)
Vulnerability from cvelistv5
Published
2024-05-09 16:43
Modified
2025-02-13 15:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer.
References
URL | Tags | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "hdf5", "vendor": "hdfgroup", "versions": [ { "lessThanOrEqual": "1.14.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-32615", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-11T14:23:03.766035Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-29T14:29:01.379Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "url": "https://github.com/HDFGroup/cve_hdf5/blob/main/CVE_list.md" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:40.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-09T16:43:09.305Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-32615", "datePublished": "2024-05-09T16:43:08.948Z", "dateReserved": "2024-04-16T00:00:00.000Z", "dateUpdated": "2025-02-13T15:52:23.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-32615\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-05-14T15:36:46.620\",\"lastModified\":\"2025-04-18T14:33:56.717\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer.\"},{\"lang\":\"es\",\"value\":\"La librer\u00eda HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5Z__nbit_decompress_one_byte en H5Znbit.c, causado por el uso anterior de un puntero inicializado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.14.4\",\"matchCriteriaId\":\"6110F965-9503-40E6-B681-CE1064B09C49\"}]}]}],\"references\":[{\"url\":\"https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/HDFGroup/cve_hdf5/blob/main/CVE_list.md\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T02:13:40.164Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-32615\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-11T14:23:03.766035Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*\"], \"vendor\": \"hdfgroup\", \"product\": \"hdf5\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.14.3\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://github.com/HDFGroup/cve_hdf5/blob/main/CVE_list.md\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-09T18:38:23.162Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-05-09T16:43:09.305Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-32615\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T15:52:23.977Z\", \"dateReserved\": \"2024-04-16T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-05-09T16:43:08.948Z\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
References
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2019-2126", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2126" }, { "name": "CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "name": "CVE-2019-12900", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900" }, { "name": "CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "name": "CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "name": "CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "name": "CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "name": "CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "name": "CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "name": "CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "name": "CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "name": "CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "name": "CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "name": "CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "name": "CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "name": "CVE-2021-45943", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45943" }, { "name": "CVE-2021-34141", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34141" }, { "name": "CVE-2022-1941", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1941" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2022-41862", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41862" }, { "name": "CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "name": "CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "name": "CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "name": "CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "name": "CVE-2022-30580", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580" }, { "name": "CVE-2022-40898", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898" }, { "name": "CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "name": "CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "name": "CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "name": "CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "name": "CVE-2023-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2455" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "name": "CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "name": "CVE-2023-1255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255" }, { "name": "CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "name": "CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "name": "CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404" }, { "name": "CVE-2023-29402", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402" }, { "name": "CVE-2023-29403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403" }, { "name": "CVE-2023-29405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2023-29409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409" }, { "name": "CVE-2023-29406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-4752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4752" }, { "name": "CVE-2023-45853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-5870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5870" }, { "name": "CVE-2022-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0543" }, { "name": "CVE-2023-4039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039" }, { "name": "CVE-2021-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848" }, { "name": "CVE-2023-4016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016" }, { "name": "CVE-2023-29383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-39323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323" }, { "name": "CVE-2023-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484" }, { "name": "CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-39318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318" }, { "name": "CVE-2023-39319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2024-1580", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1580" }, { "name": "CVE-2016-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781" }, { "name": "CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "name": "CVE-2023-45285", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-45289", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289" }, { "name": "CVE-2023-45290", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290" }, { "name": "CVE-2024-24783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783" }, { "name": "CVE-2024-24784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784" }, { "name": "CVE-2024-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2024-23807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23807" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2023-5752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2023-4641", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2024-22667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22667" }, { "name": "CVE-2023-6228", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228" }, { "name": "CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "name": "CVE-2024-24787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787" }, { "name": "CVE-2024-24788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24788" }, { "name": "CVE-2024-7348", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7348" }, { "name": "CVE-2023-7008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-24789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2024-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2022-48468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48468" }, { "name": "CVE-2023-48161", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-10976", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10976" }, { "name": "CVE-2024-10977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10977" }, { "name": "CVE-2024-10978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10978" }, { "name": "CVE-2024-10979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10979" }, { "name": "CVE-2024-10041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041" }, { "name": "CVE-2024-10963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963" }, { "name": "CVE-2025-21490", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490" }, { "name": "CVE-2025-21491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491" }, { "name": "CVE-2025-21497", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497" }, { "name": "CVE-2025-21500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500" }, { "name": "CVE-2025-21501", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501" }, { "name": "CVE-2025-21503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503" }, { "name": "CVE-2025-21505", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505" }, { "name": "CVE-2025-21519", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519" }, { "name": "CVE-2025-21522", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522" }, { "name": "CVE-2025-21523", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523" }, { "name": "CVE-2025-21529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529" }, { "name": "CVE-2025-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540" }, { "name": "CVE-2025-21546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546" }, { "name": "CVE-2025-21555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555" }, { "name": "CVE-2025-21559", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1094" }, { "name": "CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2024-24791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791" }, { "name": "CVE-2023-24531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2022-42967", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42967" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-27363", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27363" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-55549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2024-12133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133" }, { "name": "CVE-2024-12243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243" }, { "name": "CVE-2024-2236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390" }, { "name": "CVE-2025-31115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115" }, { "name": "CVE-2012-0880", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0880" }, { "name": "CVE-2017-17507", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17507" }, { "name": "CVE-2017-8806", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8806" }, { "name": "CVE-2018-10126", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10126" }, { "name": "CVE-2018-11205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11205" }, { "name": "CVE-2018-13866", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13866" }, { "name": "CVE-2018-13867", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13867" }, { "name": "CVE-2018-13868", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13868" }, { "name": "CVE-2018-13869", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13869" }, { "name": "CVE-2018-13870", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13870" }, { "name": "CVE-2018-13871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13871" }, { "name": "CVE-2018-13872", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13872" }, { "name": "CVE-2018-13874", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13874" }, { "name": "CVE-2018-13875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13875" }, { "name": "CVE-2018-13876", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13876" }, { "name": "CVE-2018-14031", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14031" }, { "name": "CVE-2018-14033", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14033" }, { "name": "CVE-2018-14034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14034" }, { "name": "CVE-2018-14035", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14035" }, { "name": "CVE-2018-14460", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14460" }, { "name": "CVE-2018-15671", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15671" }, { "name": "CVE-2018-16438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16438" }, { "name": "CVE-2018-17432", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17432" }, { "name": "CVE-2018-17433", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17433" }, { "name": "CVE-2018-17434", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17434" }, { "name": "CVE-2018-17435", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17435" }, { "name": "CVE-2018-17436", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17436" }, { "name": "CVE-2018-17437", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17437" }, { "name": "CVE-2018-17438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17438" }, { "name": "CVE-2018-17439", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17439" }, { "name": "CVE-2019-20005", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20005" }, { "name": "CVE-2019-20006", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20006" }, { "name": "CVE-2019-20007", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20007" }, { "name": "CVE-2019-20198", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20198" }, { "name": "CVE-2019-20199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20199" }, { "name": "CVE-2019-20200", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20200" }, { "name": "CVE-2019-20201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20201" }, { "name": "CVE-2019-20202", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20202" }, { "name": "CVE-2019-6988", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6988" }, { "name": "CVE-2019-8396", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8396" }, { "name": "CVE-2019-8397", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8397" }, { "name": "CVE-2019-8398", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8398" }, { "name": "CVE-2019-9151", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9151" }, { "name": "CVE-2019-9152", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9152" }, { "name": "CVE-2020-10809", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10809" }, { "name": "CVE-2020-10810", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10810" }, { "name": "CVE-2020-10811", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10811" }, { "name": "CVE-2020-10812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10812" }, { "name": "CVE-2020-18232", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18232" }, { "name": "CVE-2020-18494", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18494" }, { "name": "CVE-2021-26220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26220" }, { "name": "CVE-2021-26221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26221" }, { "name": "CVE-2021-26222", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26222" }, { "name": "CVE-2021-30485", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30485" }, { "name": "CVE-2021-31229", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31229" }, { "name": "CVE-2021-31347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31347" }, { "name": "CVE-2021-31348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31348" }, { "name": "CVE-2021-31598", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31598" }, { "name": "CVE-2021-33430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33430" }, { "name": "CVE-2021-37501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37501" }, { "name": "CVE-2021-45829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45829" }, { "name": "CVE-2021-45830", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45830" }, { "name": "CVE-2021-45832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45832" }, { "name": "CVE-2021-45833", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45833" }, { "name": "CVE-2021-46242", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46242" }, { "name": "CVE-2021-46243", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46243" }, { "name": "CVE-2021-46244", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46244" }, { "name": "CVE-2022-25942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25942" }, { "name": "CVE-2022-25972", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25972" }, { "name": "CVE-2022-26061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26061" }, { "name": "CVE-2022-30045", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30045" }, { "name": "CVE-2022-4055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4055" }, { "name": "CVE-2022-47655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47655" }, { "name": "CVE-2023-0996", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0996" }, { "name": "CVE-2023-29659", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29659" }, { "name": "CVE-2023-32570", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32570" }, { "name": "CVE-2023-39328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39328" }, { "name": "CVE-2023-39329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39329" }, { "name": "CVE-2023-51792", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51792" }, { "name": "CVE-2023-6879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6879" }, { "name": "CVE-2024-27304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27304" }, { "name": "CVE-2024-29157", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29157" }, { "name": "CVE-2024-29158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29158" }, { "name": "CVE-2024-29159", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29159" }, { "name": "CVE-2024-29160", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29160" }, { "name": "CVE-2024-29161", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29161" }, { "name": "CVE-2024-29162", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29162" }, { "name": "CVE-2024-29163", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29163" }, { "name": "CVE-2024-29164", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29164" }, { "name": "CVE-2024-29165", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29165" }, { "name": "CVE-2024-29166", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29166" }, { "name": "CVE-2024-32605", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32605" }, { "name": "CVE-2024-32606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32606" }, { "name": "CVE-2024-32607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32607" }, { "name": "CVE-2024-32608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32608" }, { "name": "CVE-2024-32609", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32609" }, { "name": "CVE-2024-32610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32610" }, { "name": "CVE-2024-32611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32611" }, { "name": "CVE-2024-32612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32612" }, { "name": "CVE-2024-32613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32613" }, { "name": "CVE-2024-32614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32614" }, { "name": "CVE-2024-32615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32615" }, { "name": "CVE-2024-32616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32616" }, { "name": "CVE-2024-32617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32617" }, { "name": "CVE-2024-32618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32618" }, { "name": "CVE-2024-32619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32619" }, { "name": "CVE-2024-32620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32620" }, { "name": "CVE-2024-32621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32621" }, { "name": "CVE-2024-32622", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32622" }, { "name": "CVE-2024-32623", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32623" }, { "name": "CVE-2024-32624", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32624" }, { "name": "CVE-2024-33873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33873" }, { "name": "CVE-2024-33874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33874" }, { "name": "CVE-2024-33875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33875" }, { "name": "CVE-2024-33876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33876" }, { "name": "CVE-2024-33877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33877" }, { "name": "CVE-2024-34402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34402" }, { "name": "CVE-2024-34403", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34403" }, { "name": "CVE-2024-38949", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38949" }, { "name": "CVE-2024-38950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38950" }, { "name": "CVE-2024-41996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41996" }, { "name": "CVE-2024-45993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45993" }, { "name": "CVE-2024-46981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46981" }, { "name": "CVE-2024-49203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49203" }, { "name": "CVE-2024-5171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5171" }, { "name": "CVE-2024-51741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51741" }, { "name": "CVE-2024-52522", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52522" }, { "name": "CVE-2024-52616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2024-53920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920" }, { "name": "CVE-2024-56378", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56378" }, { "name": "CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "name": "CVE-2024-56826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56826" }, { "name": "CVE-2024-56827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56827" }, { "name": "CVE-2024-6716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6716" }, { "name": "CVE-2025-2153", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2153" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-23022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23022" }, { "name": "CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "name": "CVE-2025-4802", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802" } ], "initial_release_date": "2025-06-19T00:00:00", "last_revision_date": "2025-06-19T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0524", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-19T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu", "vendor_advisories": [ { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35841", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35844", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35843", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35842", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35846", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35849", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35840", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35847", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35839", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35845", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35848", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848" } ] }
ghsa-cpx5-6mwc-hxp6
Vulnerability from github
Published
2024-05-14 18:30
Modified
2025-04-18 15:31
Severity ?
VLAI Severity ?
Details
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer.
{ "affected": [], "aliases": [ "CVE-2024-32615" ], "database_specific": { "cwe_ids": [ "CWE-122", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-05-14T15:36:46Z", "severity": "CRITICAL" }, "details": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer.", "id": "GHSA-cpx5-6mwc-hxp6", "modified": "2025-04-18T15:31:32Z", "published": "2024-05-14T18:30:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32615" }, { "type": "WEB", "url": "https://github.com/HDFGroup/cve_hdf5/blob/main/CVE_list.md" }, { "type": "WEB", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2024-32615
Vulnerability from gsd
Modified
2024-04-17 05:01
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-32615" ], "id": "GSD-2024-32615", "modified": "2024-04-17T05:01:56.879864Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-32615", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
rhsa-2025:3801
Vulnerability from csaf_redhat
Published
2025-04-10 09:42
Modified
2025-10-09 21:59
Summary
Red Hat Security Advisory: RHEL AI 1.5 hdf5 security update
Notes
Topic
Update hdf5 and libaec to latest upstream version with several CVE fixes
Details
RPM packages are internal build artifacts and not supported on their own.
They are only supported as part of the RHEL AI application image.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Update hdf5 and libaec to latest upstream version with several CVE fixes", "title": "Topic" }, { "category": "general", "text": "RPM packages are internal build artifacts and not supported on their own.\nThey are only supported as part of the RHEL AI application image.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3801", "url": "https://access.redhat.com/errata/RHSA-2025:3801" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "AIPCC-744", "url": "https://issues.redhat.com/browse/AIPCC-744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3801.json" } ], "title": "Red Hat Security Advisory: RHEL AI 1.5 hdf5 security update", "tracking": { "current_release_date": "2025-10-09T21:59:43+00:00", "generator": { "date": "2025-10-09T21:59:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:3801", "initial_release_date": "2025-04-10T09:42:14+00:00", "revision_history": [ { "date": "2025-04-10T09:42:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-04-10T09:42:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T21:59:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product": { "name": "Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux_ai:1.5::el9" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux AI" }, { "branches": [ { "category": "product_version", "name": "libaec-0:1.1.3-1.el9ai.src", "product": { "name": "libaec-0:1.1.3-1.el9ai.src", "product_id": "libaec-0:1.1.3-1.el9ai.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec@1.1.3-1.el9ai?arch=src" } } }, { "category": "product_version", "name": "hdf5-0:1.14.6-3.1.el9ai.src", "product": { "name": "hdf5-0:1.14.6-3.1.el9ai.src", "product_id": "hdf5-0:1.14.6-3.1.el9ai.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5@1.14.6-3.1.el9ai?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libaec-0:1.1.3-1.el9ai.x86_64", "product": { "name": "libaec-0:1.1.3-1.el9ai.x86_64", "product_id": "libaec-0:1.1.3-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec@1.1.3-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "libaec-devel-0:1.1.3-1.el9ai.x86_64", "product": { "name": "libaec-devel-0:1.1.3-1.el9ai.x86_64", "product_id": "libaec-devel-0:1.1.3-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec-devel@1.1.3-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "product": { "name": "libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "product_id": "libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec-debugsource@1.1.3-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "product": { "name": "libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "product_id": "libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec-debuginfo@1.1.3-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-static@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-3.1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "product": { "name": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "product_id": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-3.1.el9ai?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libaec-0:1.1.3-1.el9ai.aarch64", "product": { "name": "libaec-0:1.1.3-1.el9ai.aarch64", "product_id": "libaec-0:1.1.3-1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec@1.1.3-1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "libaec-devel-0:1.1.3-1.el9ai.aarch64", "product": { "name": "libaec-devel-0:1.1.3-1.el9ai.aarch64", "product_id": "libaec-devel-0:1.1.3-1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec-devel@1.1.3-1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "product": { "name": "libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "product_id": "libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec-debugsource@1.1.3-1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "product": { "name": "libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "product_id": "libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libaec-debuginfo@1.1.3-1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-devel@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi-devel@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi-static@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-static@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-debugsource@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-debuginfo@1.14.6-3.1.el9ai?arch=aarch64" } } }, { "category": "product_version", "name": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "product": { "name": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "product_id": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hdf5-openmpi-debuginfo@1.14.6-3.1.el9ai?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "hdf5-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-0:1.14.6-3.1.el9ai.src as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src" }, "product_reference": "hdf5-0:1.14.6-3.1.el9ai.src", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-devel-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-devel-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-static-0:1.14.6-3.1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64" }, "product_reference": "hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "hdf5-static-0:1.14.6-3.1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64" }, "product_reference": "hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-0:1.1.3-1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64" }, "product_reference": "libaec-0:1.1.3-1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-0:1.1.3-1.el9ai.src as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src" }, "product_reference": "libaec-0:1.1.3-1.el9ai.src", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-0:1.1.3-1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64" }, "product_reference": "libaec-0:1.1.3-1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-debuginfo-0:1.1.3-1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64" }, "product_reference": "libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-debuginfo-0:1.1.3-1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64" }, "product_reference": "libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-debugsource-0:1.1.3-1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64" }, "product_reference": "libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-debugsource-0:1.1.3-1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64" }, "product_reference": "libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-devel-0:1.1.3-1.el9ai.aarch64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64" }, "product_reference": "libaec-devel-0:1.1.3-1.el9ai.aarch64", "relates_to_product_reference": "9Base-RHELAI-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "libaec-devel-0:1.1.3-1.el9ai.x86_64 as a component of Red Hat Enterprise Linux AI 1.5 for RHEL 9.4", "product_id": "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" }, "product_reference": "libaec-devel-0:1.1.3-1.el9ai.x86_64", "relates_to_product_reference": "9Base-RHELAI-1.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37501", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2230281" } ], "notes": [ { "category": "description", "text": "Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: heap buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37501" }, { "category": "external", "summary": "RHBZ#2230281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230281" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37501" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-rfgw-5vq3-wrjf", "url": "https://github.com/advisories/GHSA-rfgw-5vq3-wrjf" } ], "release_date": "2023-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: heap buffer overread" }, { "cve": "CVE-2024-29157", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a heap buffer overflow in H5HG_read, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29157" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29157", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29157" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29158", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a stack buffer overflow in H5FL_arr_malloc, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29158" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29158" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29159", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a buffer overflow in H5Z__filter_scaleoffset, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29159" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29159", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29159" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29160", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a heap buffer overflow in H5HG__cache_heap_deserialize, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29160" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29160", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29160" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29161", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a heap buffer overflow in H5A__attr_release_table, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29161" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29161", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29161" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29162", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.13.3 and/or 1.14.2 contains a stack buffer overflow in H5HG_read, resulting in denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29162" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29162", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29162" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29163", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a heap buffer overflow in H5T__bit_find, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29163" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29163", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29163" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29163", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29163" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29164", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a stack buffer overflow in H5R__decode_heap, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29164" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29164", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29164" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29164", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29164" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-29165", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 through 1.14.3 contains a buffer overflow in H5Z__filter_fletcher32, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29165" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29165", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29165" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32605", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 has a heap-based buffer over-read in H5VM_memcpyvv in H5VM.c (called from H5D__compact_readvv in H5Dcompact.c).", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32605" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32605", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32605" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32608", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 library contains a memory corruption issue in H5A__close() function resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32608" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32608" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32609", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 allows stack consumption in the function H5E_printf_stack in H5Eint.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32609" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32609", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32609" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32609", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32609" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32611", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 may use an uninitialized value in H5A__attr_release_table in H5Aint.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32611" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32611" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32612", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer over-read in H5HL__fl_deserialize in H5HLcache.c, resulting in the corruption of the instruction pointer, a different vulnerability than CVE-2024-32613.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32612" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32612" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32613", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer over-read in the function H5HL__fl_deserialize in H5HLcache.c, a different vulnerability than CVE-2024-32612.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32613" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32613" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32614", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 has a SEGV in H5VM_memcpyvv in H5VM.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32614" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32614" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32615", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32615" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32615" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32616", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer over-read in H5O__dtype_encode_helper in H5Odtype.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32616" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32616" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32617", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer over-read caused by the unsafe use of strdup in H5MM_xstrdup in H5MM.c (called from H5G__ent_to_link in H5Glink.c).", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32617" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32617" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32617", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32617" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32618", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__get_native_type in H5Tnative.c, resulting in the corruption of the instruction pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32618" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32618" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32618", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32618" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32619", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T_copy_reopen in H5T.c, resulting in the corruption of the instruction pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32619" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32619" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32620", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer over-read in H5F_addr_decode_len in H5Fint.c, resulting in the corruption of the instruction pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32620" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32620" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32621", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5HG_read in H5HG.c (called from H5VL__native_blob_get in H5VLnative_blob.c), resulting in the corruption of the instruction pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32621" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32621" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32622", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a out-of-bounds read operation in H5FL_arr_malloc in H5FL.c (called from H5S_set_extent_simple in H5S.c).", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32622" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32622", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32622" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32623", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5VM_array_fill in H5VM.c (called from H5S_select_elements in H5Spoint.c).", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32623" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32623", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32623" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-32624", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__ref_mem_setnull in H5Tref.c (called from H5T__conv_ref in H5Tconv.c), resulting in the corruption of the instruction pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-32624" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-32624", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-32624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32624" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-33873", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5D__scatter_mem in H5Dscatgath.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-33873" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-33873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33873" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-33873", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33873" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-33874", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 has a heap buffer overflow in H5O__mtime_new_encode in H5Omtime.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-33874" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-33874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33874" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-33874", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33874" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" }, { "cve": "CVE-2024-33877", "discovery_date": "2024-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280037" } ], "notes": [ { "category": "description", "text": "HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5T__conv_struct_opt in H5Tconv.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "hdf5: multiple CVEs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-33877" }, { "category": "external", "summary": "RHBZ#2280037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-33877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-33877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33877" }, { "category": "external", "summary": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" } ], "release_date": "2024-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T09:42:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.src", "9Base-RHELAI-1.5:hdf5-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-debugsource-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-debuginfo-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-devel-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-openmpi-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.aarch64", "9Base-RHELAI-1.5:hdf5-static-0:1.14.6-3.1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.src", "9Base-RHELAI-1.5:libaec-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debuginfo-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-debugsource-0:1.1.3-1.el9ai.x86_64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.aarch64", "9Base-RHELAI-1.5:libaec-devel-0:1.1.3-1.el9ai.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3801" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hdf5: multiple CVEs" } ] }
fkie_cve-2024-32615
Vulnerability from fkie_nvd
Published
2024-05-14 15:36
Modified
2025-04-18 14:33
Severity ?
Summary
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer.
References
URL | Tags | ||
---|---|---|---|
cve@mitre.org | https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/ | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/ | Issue Tracking, Vendor Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/HDFGroup/cve_hdf5/blob/main/CVE_list.md | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*", "matchCriteriaId": "6110F965-9503-40E6-B681-CE1064B09C49", "versionEndExcluding": "1.14.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5Z__nbit_decompress_one_byte in H5Znbit.c, caused by the earlier use of an initialized pointer." }, { "lang": "es", "value": "La librer\u00eda HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5Z__nbit_decompress_one_byte en H5Znbit.c, causado por el uso anterior de un puntero inicializado." } ], "id": "CVE-2024-32615", "lastModified": "2025-04-18T14:33:56.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-14T15:36:46.620", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Third Party Advisory" ], "url": "https://github.com/HDFGroup/cve_hdf5/blob/main/CVE_list.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…