![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.18.2.2024.0538.1 |
Categoría: | openSUSE Local Security Checks |
Título: | openSUSE Security Advisory (SUSE-SU-2024:0538-1) |
Resumen: | The remote host is missing an update for the 'hdf5' package(s) announced via the SUSE-SU-2024:0538-1 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'hdf5' package(s) announced via the SUSE-SU-2024:0538-1 advisory. Vulnerability Insight: This update for hdf5 fixes the following issues: Updated to version 1.10.11 * Changed the error handling for a not found path in the find plugin process. * Fixed CVE-2018-11202, a malformed file could result in chunk index memory leaks. * Fixed a file space allocation bug in the parallel library for chunked datasets. * Fixed an assertion failure in Parallel HDF5 when a file can't be created due to an invalid library version bounds setting. * Fixed an assertion in a previous fix for CVE-2016-4332. * Fixed segfault on file close in h5debug which fails with a core dump on a file that has an illegal file size in its cache image. Fixes HDFFV-11052, CVE-2020-10812. * Fixed memory leaks that could occur when reading a dataset from a malformed file. * Fixed a bug in H5Ocopy that could generate invalid HDF5 files * Fixed potential heap buffer overflow in decoding of link info message. * Fixed potential buffer overrun issues in some object header decode routines. * Fixed a heap buffer overflow that occurs when reading from a dataset with a compact layout within a malformed HDF5 file. * Fixed CVE-2019-8396, malformed HDF5 files where content does not match expected size. * Fixed memory leak when running h5dump with proof of vulnerability file. * Added option --no-compact-subset to h5diff. Fixes since 1.10.10: * Fixed a memory corruption when reading from dataset using a hyperslab selection in file dataspace and a point selection memory dataspace. * Fix CVE-2021-37501 * Fixed an issue with variable length attributes. * Fixed an issue with hyperslab selections where an incorrect combined selection was produced. * Fixed an issue with attribute type conversion with compound datatypes. * Modified H5Fstart_swmr_write() to preserve DAPL properties. * Converted an assertion on (possibly corrupt) file contents to a normal error check. * Fixed memory leak with variable-length fill value in H5O_fill_convert(). * Fix h5repack to only print output when verbose option is selected. Fixes since 1.10.9: * Several improvements to parallel compression feature, including: + Improved support for collective I/O (for both writes and reads). + Reduction of copying of application data buffers passed to H5Dwrite. + Addition of support for incremental file space allocation for filtered datasets created in parallel. + Addition of support for HDF5's 'don't filter partial edge chunks' flag + Addition of proper support for HDF5 fill values with the feature. + Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to H5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available. + Addition of simple examples * h5repack added an optional verbose value for reporting R/W timing. * Fixed a metadata cache bug when resizing a pinned/protected cache entry. * Fixed a problem with the H5_VERS_RELEASE check in the ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'hdf5' package(s) on openSUSE Leap 15.5. Solution: Please install the updated package(s). CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-4332 BugTraq ID: 94417 http://www.securityfocus.com/bid/94417 Debian Security Information: DSA-3727 (Google Search) http://www.debian.org/security/2016/dsa-3727 https://security.gentoo.org/glsa/201701-13 http://www.talosintelligence.com/reports/TALOS-2016-0178/ Common Vulnerability Exposure (CVE) ID: CVE-2018-11202 https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 Common Vulnerability Exposure (CVE) ID: CVE-2019-8396 https://github.com/magicSwordsMan/PAAFS/tree/master/vul4 Common Vulnerability Exposure (CVE) ID: CVE-2020-10812 https://bitbucket.hdfgroup.org/projects/HDFFV/repos/hdf5/browse/release_docs/RELEASE.txt https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_4 https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/ Common Vulnerability Exposure (CVE) ID: CVE-2021-37501 https://github.com/HDFGroup/hdf5 https://github.com/HDFGroup/hdf5/issues/2458 https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md |
Copyright | Copyright (C) 2025 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |