![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.18.2.2024.0538.1 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (SUSE-SU-2024:0538-1) |
Summary: | The remote host is missing an update for the 'hdf5' package(s) announced via the SUSE-SU-2024:0538-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'hdf5' package(s) announced via the SUSE-SU-2024:0538-1 advisory. Vulnerability Insight: This update for hdf5 fixes the following issues: Updated to version 1.10.11 * Changed the error handling for a not found path in the find plugin process. * Fixed CVE-2018-11202, a malformed file could result in chunk index memory leaks. * Fixed a file space allocation bug in the parallel library for chunked datasets. * Fixed an assertion failure in Parallel HDF5 when a file can't be created due to an invalid library version bounds setting. * Fixed an assertion in a previous fix for CVE-2016-4332. * Fixed segfault on file close in h5debug which fails with a core dump on a file that has an illegal file size in its cache image. Fixes HDFFV-11052, CVE-2020-10812. * Fixed memory leaks that could occur when reading a dataset from a malformed file. * Fixed a bug in H5Ocopy that could generate invalid HDF5 files * Fixed potential heap buffer overflow in decoding of link info message. * Fixed potential buffer overrun issues in some object header decode routines. * Fixed a heap buffer overflow that occurs when reading from a dataset with a compact layout within a malformed HDF5 file. * Fixed CVE-2019-8396, malformed HDF5 files where content does not match expected size. * Fixed memory leak when running h5dump with proof of vulnerability file. * Added option --no-compact-subset to h5diff. Fixes since 1.10.10: * Fixed a memory corruption when reading from dataset using a hyperslab selection in file dataspace and a point selection memory dataspace. * Fix CVE-2021-37501 * Fixed an issue with variable length attributes. * Fixed an issue with hyperslab selections where an incorrect combined selection was produced. * Fixed an issue with attribute type conversion with compound datatypes. * Modified H5Fstart_swmr_write() to preserve DAPL properties. * Converted an assertion on (possibly corrupt) file contents to a normal error check. * Fixed memory leak with variable-length fill value in H5O_fill_convert(). * Fix h5repack to only print output when verbose option is selected. Fixes since 1.10.9: * Several improvements to parallel compression feature, including: + Improved support for collective I/O (for both writes and reads). + Reduction of copying of application data buffers passed to H5Dwrite. + Addition of support for incremental file space allocation for filtered datasets created in parallel. + Addition of support for HDF5's 'don't filter partial edge chunks' flag + Addition of proper support for HDF5 fill values with the feature. + Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to H5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available. + Addition of simple examples * h5repack added an optional verbose value for reporting R/W timing. * Fixed a metadata cache bug when resizing a pinned/protected cache entry. * Fixed a problem with the H5_VERS_RELEASE check in the ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'hdf5' package(s) on openSUSE Leap 15.5. Solution: Please install the updated package(s). CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-4332 BugTraq ID: 94417 http://www.securityfocus.com/bid/94417 Debian Security Information: DSA-3727 (Google Search) http://www.debian.org/security/2016/dsa-3727 https://security.gentoo.org/glsa/201701-13 http://www.talosintelligence.com/reports/TALOS-2016-0178/ Common Vulnerability Exposure (CVE) ID: CVE-2018-11202 https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 Common Vulnerability Exposure (CVE) ID: CVE-2019-8396 https://github.com/magicSwordsMan/PAAFS/tree/master/vul4 Common Vulnerability Exposure (CVE) ID: CVE-2020-10812 https://bitbucket.hdfgroup.org/projects/HDFFV/repos/hdf5/browse/release_docs/RELEASE.txt https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_4 https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/ Common Vulnerability Exposure (CVE) ID: CVE-2021-37501 https://github.com/HDFGroup/hdf5 https://github.com/HDFGroup/hdf5/issues/2458 https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |