You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix issue with handling of failure during discard of metadata cache entries (#5817)
When discarding a metadata cache entry after flushing it, errors
during the discard process could cause the library to skip calling
the 'free_icr' callback for the entry. This could result in resource
leaks and the inability of the cache to be fully flushed and closed
due to issues such as pinned entries remaining in the cache. This
has been fixed by noting errors during the discard process, but
attempting to fully free a cache entry before signalling that an
error has occurred.
Fixes CVE-2025-7068
Copy file name to clipboardExpand all lines: release_docs/CHANGELOG.md
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -556,13 +556,19 @@ Added Fortran wrapper h5fdsubfiling_get_file_mapping_f() for the subfiling file
556
556
# 🪲 Bug Fixes
557
557
558
558
## Library
559
+
560
+
### Fixed security issue CVE-2025-7068
561
+
562
+
Failures during the discard process on a metadata cache entry could cause the library to skip calling the callback to free the cache entry. This could result in resource leaks and issues with flushing and closing the metadata cache during file close. This has been fixed by noting errors during the discard process, but attempting to fully free a cache entry before signalling that an error has occurred.
563
+
564
+
Fixes GitHub issue #5578
565
+
559
566
### Fix bugs in object header operations
560
567
561
568
In some rare circumstances, such as deleting hard links that point to their own parent group in a file using the new file format, memory corruption could occur due to recursive operations changing data structures being operated on by multiple levels of recursion. Made changes to delay changing the data structure in a dangerous way until recursion is complete.
562
569
563
570
Fixes GitHub issue #5854
564
571
565
-
566
572
### Fixed security issues CVE-2025-6816, CVE-2025-6856 and CVE-2025-2923
567
573
568
574
A specially constructed HDF5 file could contain a corrupted object header with a continuation message that points back to itself. This could result in an internal buffer being allocated with too small of a size, leading to a heap buffer overflow. This has been fixed by checking the expected number of object header chunks against the actual value as chunks are being deserialized.
@@ -588,7 +594,7 @@ Added Fortran wrapper h5fdsubfiling_get_file_mapping_f() for the subfiling file
588
594
Fixes GitHub issue #5861
589
595
590
596
### Fixed security issue CVE-2025-2153
591
-
597
+
592
598
The message flags field could be modified such that a message that is not sharable according to the share_flags field in H5O_msg_class_t can be treated as sharable. An assert has been added in H5O__msg_write_real to make sure messages that are not sharable can't be modified to shared. Additionally, the check in H5O__chunk_deserialize that catches unsharable messages being marked as sharable has been improved.
0 commit comments