Skip to content

Commit d37b537

Browse files
authored
An image size was corrupted and decoded as 0 resulting in a NULL image buffer, which caused a NULL pointer dereference when the image being copied to the buffer. The invalid image size was caught in the PR #5710. This change catches right before the copying. Fixes GH issue #5384
1 parent c46d8b2 commit d37b537

File tree

2 files changed

+7
-0
lines changed

2 files changed

+7
-0
lines changed

release_docs/CHANGELOG.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -650,6 +650,12 @@ Added Fortran wrapper h5fdsubfiling_get_file_mapping_f() for the subfiling file
650650

651651
Fixes GitHub issue [#5382](https://github.com/HDFGroup/hdf5/issues/5382)
652652

653+
### Fixed security issues CVE-2025-2913 and CVE-2025-2926
654+
655+
The size of a continuation message was decoded as 0, causing multiple vulnerabilities. An error check was added to return failure to prevent further processing of invalid data.
656+
657+
Fixes GitHub issue #5376 and #5384
658+
653659
### Revised handling of Unicode filenames on Windows<a name="utf-8">
654660

655661
In the HDF5 1.14.4 release, a change was made to address some issues with the library's handling of code pages and file paths on Windows. This change introduced other issues with the handling of UTF-8 file names that caused breakage for software using the 1.14.4 and 1.14.5 releases of HDF5. That change was reverted for the 1.14.6 release and the behavior has been slightly modified for this release.

src/H5Ocache.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -602,6 +602,7 @@ H5O__cache_chk_get_initial_load_size(void *_udata, size_t *image_len)
602602
assert(udata);
603603
assert(udata->oh);
604604
assert(image_len);
605+
assert(udata->size);
605606

606607
/* Set the image length size */
607608
*image_len = udata->size;

0 commit comments

Comments
 (0)