summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGyorgy Sarvari <skandigraun@gmail.com>2025-10-14 16:55:27 +0200
committerKhem Raj <raj.khem@gmail.com>2025-10-14 09:00:26 -0700
commit62f033d97da9400de40d162af84e9624ebfa4e9f (patch)
tree80fb7414310dc8b864567be2db31b54b58ed0ed3
parentde5693d6d99a72997fbebbbbacd7f283e96eb9cb (diff)
downloadmeta-openembedded-62f033d97da9400de40d162af84e9624ebfa4e9f.tar.gz
hdf5: patch CVE-2025-2924
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-2924 Pick the patch that is marked to resolve the issue linked in the nvd report. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
-rw-r--r--meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch36
-rw-r--r--meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb1
2 files changed, 37 insertions, 0 deletions
diff --git a/meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch b/meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch
new file mode 100644
index 0000000000..a86b5a491b
--- /dev/null
+++ b/meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch
@@ -0,0 +1,36 @@
1From f76c5adea55edec75680fdd7365cc97abc112d0e Mon Sep 17 00:00:00 2001
2From: Glenn Song <43005495+glennsong09@users.noreply.github.com>
3Date: Mon, 15 Sep 2025 07:56:54 -0500
4Subject: [PATCH] Fix CVE-2025-2924 (#5814)
5
6CVE: CVE-2025-2924
7Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/0a57195ca67d278f1cf7d01566c121048e337a59]
8
9Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
10---
11 src/H5HLcache.c | 5 +++++
12 1 file changed, 5 insertions(+)
13
14diff --git a/src/H5HLcache.c b/src/H5HLcache.c
15index d0836fe..7f412d2 100644
16--- a/src/H5HLcache.c
17+++ b/src/H5HLcache.c
18@@ -225,6 +225,7 @@ H5HL__fl_deserialize(H5HL_t *heap)
19 /* check arguments */
20 assert(heap);
21 assert(!heap->freelist);
22+ HDcompile_assert(sizeof(hsize_t) == sizeof(uint64_t));
23
24 /* Build free list */
25 free_block = heap->free_block;
26@@ -232,6 +233,10 @@ H5HL__fl_deserialize(H5HL_t *heap)
27 const uint8_t *image; /* Pointer into image buffer */
28
29 /* Sanity check */
30+
31+ if (free_block > UINT64_MAX - (2 * heap->sizeof_size))
32+ HGOTO_ERROR(H5E_HEAP, H5E_BADRANGE, FAIL, "decoded heap block address overflow");
33+
34 if ((free_block + (2 * heap->sizeof_size)) > heap->dblk_size)
35 HGOTO_ERROR(H5E_HEAP, H5E_BADRANGE, FAIL, "bad heap free list");
36
diff --git a/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb b/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb
index 9327c8cc91..39326d3072 100644
--- a/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb
+++ b/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb
@@ -17,6 +17,7 @@ SRC_URI = "https://support.hdfgroup.org/releases/hdf5/v1_14/v1_14_6/downloads/${
17 file://0001-Fix-CVE-2025-2153-5795.patch \ 17 file://0001-Fix-CVE-2025-2153-5795.patch \
18 file://0001-Fix-CVE-2025-2310-5872.patch \ 18 file://0001-Fix-CVE-2025-2310-5872.patch \
19 file://0001-Refix-of-the-attempts-in-PR-5209-5722.patch \ 19 file://0001-Refix-of-the-attempts-in-PR-5209-5722.patch \
20 file://0001-Fix-CVE-2025-2924-5814.patch \
20 " 21 "
21SRC_URI[sha256sum] = "e4defbac30f50d64e1556374aa49e574417c9e72c6b1de7a4ff88c4b1bea6e9b" 22SRC_URI[sha256sum] = "e4defbac30f50d64e1556374aa49e574417c9e72c6b1de7a4ff88c4b1bea6e9b"
22 23