OESA-2026-1005

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1005
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1005.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2026-1005
Upstream
Published
2026-01-09T14:05:31Z
Modified
2026-01-09T14:29:58.368886Z
Summary
hdf5 security update
Details

HDF5 is a data model, library, and file format for storing and managing data. It supports an unlimited variety of datatypes, and is designed for flexible and efficient I/O and for high volume and complex data. HDF5 is portable and is extensible, allowing applications to evolve in their use of HDF5. The HDF5 Technology suite includes tools and applications for managing, manipulating, viewing, and analyzing data in the HDF5 format.

Security Fix(es):

A vulnerability, which was classified as critical, was found in HDF5 1.14.6. Affected is the function H5SM_delete of the file H5SM.c of the component h5 File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.(CVE-2025-2153)

A vulnerability classified as problematic has been found in HDF5 up to 1.14.6. This affects the function H5FS_sinfoSrializeSctcb of the file src/H5FScache.c. The manipulation of the argument sect leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.(CVE-2025-2914)

A vulnerability, which was classified as problematic, has been found in HDF5 1.14.6. Affected by this issue is the function H5O_mtimenew_encode of the file src/H5Omtime.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.(CVE-2025-6750)

A vulnerability classified as problematic was found in HDF5 1.14.6. This vulnerability affects the function H5O_fsinfoencode of the file /src/H5Ofsinfo.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.(CVE-2025-6816)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / hdf5

Package

Name
hdf5
Purl
pkg:rpm/openEuler/hdf5&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.5-2.oe2403sp2

Ecosystem specific

{
    "aarch64": [
        "hdf5-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-debuginfo-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-debugsource-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-devel-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-mpich-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-mpich-devel-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-mpich-static-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-openmpi-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-openmpi-devel-1.14.5-2.oe2403sp2.aarch64.rpm",
        "hdf5-openmpi-static-1.14.5-2.oe2403sp2.aarch64.rpm"
    ],
    "x86_64": [
        "hdf5-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-debuginfo-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-debugsource-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-devel-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-mpich-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-mpich-devel-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-mpich-static-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-openmpi-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-openmpi-devel-1.14.5-2.oe2403sp2.x86_64.rpm",
        "hdf5-openmpi-static-1.14.5-2.oe2403sp2.x86_64.rpm"
    ],
    "src": [
        "hdf5-1.14.5-2.oe2403sp2.src.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2026-1005.json"