Skip to content

Commit 750b00f

Browse files
bmriblercwojek
authored andcommitted
An image size was corrupted and decoded as 0 resulting in a NULL image buffer, which caused a NULL pointer dereference when the image being copied to the buffer. The invalid image size was caught in the PR HDFGroup#5710. This change catches right before the copying. Fixes GH issue HDFGroup#5384
1 parent f7780a3 commit 750b00f

File tree

2 files changed

+7
-0
lines changed

2 files changed

+7
-0
lines changed

release_docs/CHANGELOG.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -650,6 +650,12 @@ Added Fortran wrapper h5fdsubfiling_get_file_mapping_f() for the subfiling file
650650

651651
Fixes GitHub issue [#5382](https://github.com/HDFGroup/hdf5/issues/5382)
652652

653+
### Fixed security issues CVE-2025-2913 and CVE-2025-2926
654+
655+
The size of a continuation message was decoded as 0, causing multiple vulnerabilities. An error check was added to return failure to prevent further processing of invalid data.
656+
657+
Fixes GitHub issue #5376 and #5384
658+
653659
### Revised handling of Unicode filenames on Windows<a name="utf-8">
654660

655661
In the HDF5 1.14.4 release, a change was made to address some issues with the library's handling of code pages and file paths on Windows. This change introduced other issues with the handling of UTF-8 file names that caused breakage for software using the 1.14.4 and 1.14.5 releases of HDF5. That change was reverted for the 1.14.6 release and the behavior has been slightly modified for this release.

src/H5Ocache.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -602,6 +602,7 @@ H5O__cache_chk_get_initial_load_size(void *_udata, size_t *image_len)
602602
assert(udata);
603603
assert(udata->oh);
604604
assert(image_len);
605+
assert(udata->size);
605606

606607
/* Set the image length size */
607608
*image_len = udata->size;

0 commit comments

Comments
 (0)