diff options
author | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-10-14 16:55:27 +0200 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2025-10-14 09:00:26 -0700 |
commit | 62f033d97da9400de40d162af84e9624ebfa4e9f (patch) | |
tree | 80fb7414310dc8b864567be2db31b54b58ed0ed3 | |
parent | de5693d6d99a72997fbebbbbacd7f283e96eb9cb (diff) | |
download | meta-openembedded-62f033d97da9400de40d162af84e9624ebfa4e9f.tar.gz |
hdf5: patch CVE-2025-2924
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-2924
Pick the patch that is marked to resolve the issue linked in the
nvd report.
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
-rw-r--r-- | meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch | 36 | ||||
-rw-r--r-- | meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb | 1 |
2 files changed, 37 insertions, 0 deletions
diff --git a/meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch b/meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch new file mode 100644 index 0000000000..a86b5a491b --- /dev/null +++ b/meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From f76c5adea55edec75680fdd7365cc97abc112d0e Mon Sep 17 00:00:00 2001 | ||
2 | From: Glenn Song <43005495+glennsong09@users.noreply.github.com> | ||
3 | Date: Mon, 15 Sep 2025 07:56:54 -0500 | ||
4 | Subject: [PATCH] Fix CVE-2025-2924 (#5814) | ||
5 | |||
6 | CVE: CVE-2025-2924 | ||
7 | Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/0a57195ca67d278f1cf7d01566c121048e337a59] | ||
8 | |||
9 | Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> | ||
10 | --- | ||
11 | src/H5HLcache.c | 5 +++++ | ||
12 | 1 file changed, 5 insertions(+) | ||
13 | |||
14 | diff --git a/src/H5HLcache.c b/src/H5HLcache.c | ||
15 | index d0836fe..7f412d2 100644 | ||
16 | --- a/src/H5HLcache.c | ||
17 | +++ b/src/H5HLcache.c | ||
18 | @@ -225,6 +225,7 @@ H5HL__fl_deserialize(H5HL_t *heap) | ||
19 | /* check arguments */ | ||
20 | assert(heap); | ||
21 | assert(!heap->freelist); | ||
22 | + HDcompile_assert(sizeof(hsize_t) == sizeof(uint64_t)); | ||
23 | |||
24 | /* Build free list */ | ||
25 | free_block = heap->free_block; | ||
26 | @@ -232,6 +233,10 @@ H5HL__fl_deserialize(H5HL_t *heap) | ||
27 | const uint8_t *image; /* Pointer into image buffer */ | ||
28 | |||
29 | /* Sanity check */ | ||
30 | + | ||
31 | + if (free_block > UINT64_MAX - (2 * heap->sizeof_size)) | ||
32 | + HGOTO_ERROR(H5E_HEAP, H5E_BADRANGE, FAIL, "decoded heap block address overflow"); | ||
33 | + | ||
34 | if ((free_block + (2 * heap->sizeof_size)) > heap->dblk_size) | ||
35 | HGOTO_ERROR(H5E_HEAP, H5E_BADRANGE, FAIL, "bad heap free list"); | ||
36 | |||
diff --git a/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb b/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb index 9327c8cc91..39326d3072 100644 --- a/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb +++ b/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb | |||
@@ -17,6 +17,7 @@ SRC_URI = "https://support.hdfgroup.org/releases/hdf5/v1_14/v1_14_6/downloads/${ | |||
17 | file://0001-Fix-CVE-2025-2153-5795.patch \ | 17 | file://0001-Fix-CVE-2025-2153-5795.patch \ |
18 | file://0001-Fix-CVE-2025-2310-5872.patch \ | 18 | file://0001-Fix-CVE-2025-2310-5872.patch \ |
19 | file://0001-Refix-of-the-attempts-in-PR-5209-5722.patch \ | 19 | file://0001-Refix-of-the-attempts-in-PR-5209-5722.patch \ |
20 | file://0001-Fix-CVE-2025-2924-5814.patch \ | ||
20 | " | 21 | " |
21 | SRC_URI[sha256sum] = "e4defbac30f50d64e1556374aa49e574417c9e72c6b1de7a4ff88c4b1bea6e9b" | 22 | SRC_URI[sha256sum] = "e4defbac30f50d64e1556374aa49e574417c9e72c6b1de7a4ff88c4b1bea6e9b" |
22 | 23 | ||