summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--meta-oe/recipes-support/hdf5/files/0001-Refix-of-the-attempts-in-PR-5209-5722.patch47
-rw-r--r--meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb1
2 files changed, 48 insertions, 0 deletions
diff --git a/meta-oe/recipes-support/hdf5/files/0001-Refix-of-the-attempts-in-PR-5209-5722.patch b/meta-oe/recipes-support/hdf5/files/0001-Refix-of-the-attempts-in-PR-5209-5722.patch
new file mode 100644
index 0000000000..bb18879b5e
--- /dev/null
+++ b/meta-oe/recipes-support/hdf5/files/0001-Refix-of-the-attempts-in-PR-5209-5722.patch
@@ -0,0 +1,47 @@
1From 0354419c3b5c6832c994b005903372f156b5fddb Mon Sep 17 00:00:00 2001
2From: bmribler <39579120+bmribler@users.noreply.github.com>
3Date: Wed, 13 Aug 2025 14:45:41 -0400
4Subject: [PATCH] Refix of the attempts in PR-5209 (#5722)
5
6This PR addresses the root cause of the issue by adding a sanity-check immediately
7after reading the file space page size from the file.
8
9The same fuzzer in GH-5376 was used to verify that the assert before the vulnerability
10had occurred and that an error indicating a corrupted file space page size replaced it.
11
12CVE: CVE-2025-2914
13Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/804f3bace997e416917b235dbd3beac3652a8a05]
14
15Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
16---
17 src/H5Fsuper.c | 2 ++
18 src/H5Ofsinfo.c | 3 +++
19 2 files changed, 5 insertions(+)
20
21diff --git a/src/H5Fsuper.c b/src/H5Fsuper.c
22index d9fe3a7..1c8dc6c 100644
23--- a/src/H5Fsuper.c
24+++ b/src/H5Fsuper.c
25@@ -746,6 +746,8 @@ H5F__super_read(H5F_t *f, H5P_genplist_t *fa_plist, bool initial_read)
26 if (!(flags & H5O_MSG_FLAG_WAS_UNKNOWN)) {
27 H5O_fsinfo_t fsinfo; /* File space info message from superblock extension */
28
29+ memset(&fsinfo, 0, sizeof(H5O_fsinfo_t));
30+
31 /* f->shared->null_fsm_addr: Whether to drop free-space to the floor */
32 /* The h5clear tool uses this property to tell the library
33 * to drop free-space to the floor
34diff --git a/src/H5Ofsinfo.c b/src/H5Ofsinfo.c
35index 5b69235..2bb6ea6 100644
36--- a/src/H5Ofsinfo.c
37+++ b/src/H5Ofsinfo.c
38@@ -182,6 +182,9 @@ H5O__fsinfo_decode(H5F_t *f, H5O_t H5_ATTR_UNUSED *open_oh, unsigned H5_ATTR_UNU
39 if (H5_IS_BUFFER_OVERFLOW(p, H5F_sizeof_size(f), p_end))
40 HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "ran off end of input buffer while decoding");
41 H5F_DECODE_LENGTH(f, p, fsinfo->page_size); /* File space page size */
42+ /* Basic sanity check */
43+ if (fsinfo->page_size == 0 || fsinfo->page_size > H5F_FILE_SPACE_PAGE_SIZE_MAX)
44+ HGOTO_ERROR(H5E_OHDR, H5E_BADVALUE, NULL, "invalid page size in file space info");
45
46 if (H5_IS_BUFFER_OVERFLOW(p, 2, p_end))
47 HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "ran off end of input buffer while decoding");
diff --git a/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb b/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb
index 52727cfae3..9327c8cc91 100644
--- a/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb
+++ b/meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb
@@ -16,6 +16,7 @@ SRC_URI = "https://support.hdfgroup.org/releases/hdf5/v1_14/v1_14_6/downloads/${
16 file://0001-cmake-remove-build-flags.patch \ 16 file://0001-cmake-remove-build-flags.patch \
17 file://0001-Fix-CVE-2025-2153-5795.patch \ 17 file://0001-Fix-CVE-2025-2153-5795.patch \
18 file://0001-Fix-CVE-2025-2310-5872.patch \ 18 file://0001-Fix-CVE-2025-2310-5872.patch \
19 file://0001-Refix-of-the-attempts-in-PR-5209-5722.patch \
19 " 20 "
20SRC_URI[sha256sum] = "e4defbac30f50d64e1556374aa49e574417c9e72c6b1de7a4ff88c4b1bea6e9b" 21SRC_URI[sha256sum] = "e4defbac30f50d64e1556374aa49e574417c9e72c6b1de7a4ff88c4b1bea6e9b"
21 22