<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2026-0017</id>
    <title>An update for hdf5 is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2026-03-02 12:00:43"/>
    <updated date="2026-03-02 12:00:43"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2924" id="CVE-2025-2924" title="CVE-2025-2924 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6858" id="CVE-2025-6858" title="CVE-2025-6858 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2913" id="CVE-2025-2913" title="CVE-2025-2913 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2925" id="CVE-2025-2925" title="CVE-2025-2925 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2153" id="CVE-2025-2153" title="CVE-2025-2153 Base Score: 8.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6857" id="CVE-2025-6857" title="CVE-2025-6857 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-7069" id="CVE-2025-7069" title="CVE-2025-7069 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6818" id="CVE-2025-6818" title="CVE-2025-6818 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2914" id="CVE-2025-2914" title="CVE-2025-2914 Base Score: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6516" id="CVE-2025-6516" title="CVE-2025-6516 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6856" id="CVE-2025-6856" title="CVE-2025-6856 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2310" id="CVE-2025-2310" title="CVE-2025-2310 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2923" id="CVE-2025-2923" title="CVE-2025-2923 Base Score: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6816" id="CVE-2025-6816" title="CVE-2025-6816 Base Score: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-2926" id="CVE-2025-2926" title="CVE-2025-2926 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-7068" id="CVE-2025-7068" title="CVE-2025-7068 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-44905" id="CVE-2025-44905" title="CVE-2025-44905 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6750" id="CVE-2025-6750" title="CVE-2025-6750 Base Score: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6269" id="CVE-2025-6269" title="CVE-2025-6269 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6817" id="CVE-2025-6817" title="CVE-2025-6817 Base Score: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-7067" id="CVE-2025-7067" title="CVE-2025-7067 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A vulnerability, which was classified as problematic, was found in HDF5 up to 1.14.6. This affects the function H5HL__fl_deserialize of the file src/H5HLcache.c. The manipulation of the argument free_block leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. (CVE-2025-2924)

A vulnerability was found in HDF5 1.14.6 and classified as problematic. Affected by this issue is the function H5C__flush_single_entry of the file src/H5Centry.c. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. (CVE-2025-6858)

A vulnerability was found in HDF5 up to 1.14.6. It has been rated as critical. Affected by this issue is the function H5FL__blk_gc_list of the file src/H5FL.c. The manipulation of the argument H5FL_blk_head_t leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. (CVE-2025-2913)

A vulnerability has been found in HDF5 up to 1.14.6 and classified as problematic. This vulnerability affects the function H5MM_realloc of the file src/H5MM.c. The manipulation of the argument mem leads to double free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. (CVE-2025-2925)

A vulnerability, which was classified as critical, was found in HDF5 1.14.6. Affected is the function H5SM_delete of the file H5SM.c of the component h5 File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. (CVE-2025-2153)

A vulnerability has been found in HDF5 1.14.6 and classified as problematic. Affected by this vulnerability is the function H5G__node_cmp3 of the file src/H5Gnode.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. (CVE-2025-6857)

A vulnerability, which was classified as problematic, was found in HDF5 1.14.6. Affected is the function H5FS__sect_link_size of the file src/H5FSsection.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. (CVE-2025-7069)

A vulnerability, which was classified as problematic, was found in HDF5 1.14.6. Affected is the function H5O__chunk_protect of the file /src/H5Ochunk.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. (CVE-2025-6818)

A vulnerability classified as problematic has been found in HDF5 up to 1.14.6. This affects the function H5FS__sinfo_Srialize_Sct_cb of the file src/H5FScache.c. The manipulation of the argument sect leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. (CVE-2025-2914)

A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. (CVE-2025-6516)

A vulnerability, which was classified as problematic, was found in HDF5 1.14.6. Affected is the function H5FL__reg_gc_list of the file src/H5FL.c. The manipulation leads to use after free. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. (CVE-2025-6856)

A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor plans to fix this issue in an upcoming release. (CVE-2025-2310)

A vulnerability, which was classified as problematic, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5F_addr_encode_len of the file src/H5Fint.c. The manipulation of the argument pp leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. (CVE-2025-2923)

A vulnerability classified as problematic was found in HDF5 1.14.6. This vulnerability affects the function H5O__fsinfo_encode of the file /src/H5Ofsinfo.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. (CVE-2025-6816)

A vulnerability was found in HDF5 up to 1.14.6 and classified as problematic. This issue affects the function H5O__cache_chk_serialize of the file src/H5Ocache.c. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. (CVE-2025-2926)

A vulnerability, which was classified as problematic, has been found in HDF5 1.14.6. This issue affects the function H5FL__malloc of the file src/H5FL.c. The manipulation leads to memory leak. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. (CVE-2025-7068)

hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5Z__filter_scaleoffset function. (CVE-2025-44905)

A vulnerability, which was classified as problematic, has been found in HDF5 1.14.6. Affected by this issue is the function H5O__mtime_new_encode of the file src/H5Omtime.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. (CVE-2025-6750)

A vulnerability classified as critical was found in HDF5 up to 1.14.6. Affected by this vulnerability is the function H5C__reconstruct_cache_entry of the file H5Cimage.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. (CVE-2025-6269)

A vulnerability, which was classified as problematic, has been found in HDF5 1.14.6. This issue affects the function H5C__load_entry of the file /src/H5Centry.c. The manipulation leads to resource consumption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. (CVE-2025-6817)

A vulnerability classified as problematic was found in HDF5 1.14.6. This vulnerability affects the function H5FS__sinfo_serialize_node_cb of the file src/H5FScache.c. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. (CVE-2025-7067)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="hdf5">
        <name>HCE 2.0</name>
        <package arch="x86_64" name="hdf5" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="hdf5-devel" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-devel-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="hdf5-mpich" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-mpich-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="hdf5-mpich-devel" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-mpich-devel-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="hdf5-mpich-static" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-mpich-static-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="hdf5-openmpi" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-openmpi-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="hdf5-openmpi-devel" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-openmpi-devel-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="hdf5-openmpi-static" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-openmpi-static-1.14.5-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5-devel" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-devel-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5-mpich" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-mpich-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5-mpich-devel" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-mpich-devel-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5-mpich-static" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-mpich-static-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5-openmpi" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-openmpi-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5-openmpi-devel" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-openmpi-devel-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="hdf5-openmpi-static" version="1.14.5" release="1.r2.hce2">
          <filename>hdf5-openmpi-static-1.14.5-1.r2.hce2.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
