Skip to content

Commit b5ed0f1

Browse files
Small changes and added links specifically for issues and CVEs
1 parent e15d2e0 commit b5ed0f1

File tree

1 file changed

+34
-32
lines changed

1 file changed

+34
-32
lines changed

release_docs/CHANGELOG.md

Lines changed: 34 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -558,64 +558,65 @@ Added Fortran wrapper `h5fdsubfiling_get_file_mapping_f()` for the subfiling fil
558558

559559
Fixed a heap-based buffer overflow in H5F__accum_free caused by an integer overflow when calculating new_accum_size. Added validation in H5O__mdci_decode to detect and reject invalid values early, preventing the overflow condition.
560560

561-
Fixes GitHub issue #5380
561+
Fixes GitHub issue [#5380](https://github.com/HDFGroup/hdf5/issues/5380)
562562

563563
### Fixed security issue CVE-2025-7068
564564

565565
Failures during the discard process on a metadata cache entry could cause the library to skip calling the callback to free the cache entry. This could result in resource leaks and issues with flushing and closing the metadata cache during file close. This has been fixed by noting errors during the discard process, but attempting to fully free a cache entry before signalling that an error has occurred.
566566

567-
Fixes GitHub issue #5578
567+
Fixes GitHub issue [#5578](https://github.com/HDFGroup/hdf5/issues/5578)
568568

569569
### Fix bugs in object header operations
570570

571571
In some rare circumstances, such as deleting hard links that point to their own parent group in a file using the new file format, memory corruption could occur due to recursive operations changing data structures being operated on by multiple levels of recursion. Made changes to delay changing the data structure in a dangerous way until recursion is complete.
572572

573-
Fixes GitHub issue #5854
573+
Fixes GitHub issue [#5854](https://github.com/HDFGroup/hdf5/issues/5854)
574574

575-
### Fixed security issues CVE-2025-6816, CVE-2025-6856 and CVE-2025-2923
575+
### Fixed security issues [CVE-2025-6816](https://nvd.nist.gov/vuln/detail/CVE-2025-6816), [CVE-2025-6856](https://nvd.nist.gov/vuln/detail/CVE-2025-6856) and [CVE-2025-2923](https://nvd.nist.gov/vuln/detail/CVE-2025-2923)
576576

577577
A specially constructed HDF5 file could contain a corrupted object header with a continuation message that points back to itself. This could result in an internal buffer being allocated with too small of a size, leading to a heap buffer overflow. This has been fixed by checking the expected number of object header chunks against the actual value as chunks are being deserialized.
578578

579-
Fixes GitHub issues #5571, #5574 and #5381
579+
Fixes GitHub issues [#5571](https://github.com/HDFGroup/hdf5/issues/5571), [#5574](https://github.com/HDFGroup/hdf5/issues/5574) and [#5381](https://github.com/HDFGroup/hdf5/issues/5381)
580580

581-
### Fixed security issue CVE-2025-6750
581+
### Fixed security issue [CVE-2025-6750](https://nvd.nist.gov/vuln/detail/CVE-2025-6750)
582582

583583
A heap buffer overflow occurred because an mtime message was not properly decoded, resulting in a buffer of size 0 being passed into the encoder. This has been fixed by decoding old and new mtime messages which will allow invalid message size to be detected.
584584

585-
Fixes GitHub issue #5549
585+
Fixes GitHub issue [#5549](https://github.com/HDFGroup/hdf5/issues/5549)
586586

587-
### Fixed CVE-2025-6269
587+
### Fixed [CVE-2025-6269](https://nvd.nist.gov/vuln/detail/CVE-2025-6269)
588588

589589
There were several security vulnerabilities found in the function H5C__reconstruct_cache_entry(), including buffer overflows and memory leaks. The function has been hardened with bounds checks, input validation, and safe cleanup.
590590

591-
Fixes GitHub issues #5579 and #5581
591+
Fixes GitHub issues [#5579](https://github.com/HDFGroup/hdf5/issues/5579) and [#5581](https://github.com/HDFGroup/hdf5/issues/5581)
592592

593593
### Fixed a problem with the scale-offset filter
594594

595595
A security fix added to 1.14.6 introduced a regression where certain data values could trigger a library error (not a crash or segfault).
596596

597-
Fixes GitHub issue #5861
597+
Fixes GitHub issue [#5861](https://github.com/HDFGroup/hdf5/issues/5861)
598598

599-
### Fixed security issue CVE-2025-2153
599+
### Fixed security issue [CVE-2025-2153](https://nvd.nist.gov/vuln/detail/CVE-2025-2153)
600600

601-
The message flags field could be modified such that a message that is not sharable according to the share_flags field in H5O_msg_class_t can be treated as sharable. An assert has been added in H5O__msg_write_real to make sure messages that are not sharable can't be modified to shared. Additionally, the check in H5O__chunk_deserialize that catches unsharable messages being marked as sharable has been improved.
601+
The message flags field could be modified such that a message that is not sharable according to the `share_flags` field in `H5O_msg_class_t` can be treated as sharable. An assert has been added in `H5O__msg_write_real` to make sure messages that are not sharable can't be modified to shared. Additionally, the check in `H5O__chunk_deserialize` that catches unsharable messages being marked as sharable has been improved.
602602

603-
Fixes GitHub issue #5329
603+
Fixes GitHub issue [#5329](https://github.com/HDFGroup/hdf5/issues/5329)
604604

605-
### Fixed security issue CVE-2025-2925
606-
Actual_len + H5C_IMAGE_EXTRA_SPACE, which was used by H5MM_realloc as the size input, could equal 0 due to bad inputs. When H5MM_realloc was called, it freed image, but then could get sent to done before new_image could be assigned to image. Because the pointer for image wasn't null, it was freed again in done, causing a double-free vulnerability. H5C__load_entry() now checks for an image buffer length of 0 before calling H5MM_realloc.
605+
### Fixed security issue [CVE-2025-2925](https://nvd.nist.gov/vuln/detail/CVE-2025-2925)
607606

608-
Fixes Github issue #5383
607+
`Actual_len` + `H5C_IMAGE_EXTRA_SPACE`, which was used by `H5MM_realloc` as the size input, could equal 0 due to bad inputs. When `H5MM_realloc` was called, it freed image, but then could get sent to done before new_image could be assigned to image. Because the pointer for image wasn't null, it was freed again in done, causing a double-free vulnerability. `H5C__load_entry()` now checks for an image buffer length of 0 before calling `H5MM_realloc`.
609608

610-
### Fixed security issue CVE-2025-6857
609+
Fixes Github issue [#5383](https://github.com/HDFGroup/hdf5/issues/5383)
610+
611+
### Fixed security issue [CVE-2025-6857](https://nvd.nist.gov/vuln/detail/CVE-2025-6857)
611612

612613
An HDF5 file had a corrupted v1 B-tree that would result in a stack overflow when performing a lookup on it. This has been fixed with additional integrity checks.
613614

614-
Fixes GitHub issue #5575
615+
Fixes GitHub issue [#5575](https://github.com/HDFGroup/hdf5/issues/5575)
615616

616617
### Check for overflow in decoded heap block addresses
617618

618-
Currently, we do not check for overflow when decoding addresses from the heap, which can cause overflow problems. We've added a check in H5HL__fl_deserialize to ensure no overflow can occur.
619+
Currently, we do not check for overflow when decoding addresses from the heap, which can cause overflow problems. We've added a check in `H5HL__fl_deserialize` to ensure no overflow can occur.
619620

620621
Fixes GitHub issue [#5382](https://github.com/HDFGroup/hdf5/issues/5382)
621622

@@ -625,12 +626,14 @@ Added Fortran wrapper `h5fdsubfiling_get_file_mapping_f()` for the subfiling fil
625626

626627
On Windows, the library once again assumes that filename strings will be UTF-8 encoded strings and will attempt to convert them to UTF-16 before passing them to Windows API functions. However, if the library fails to convert a filename string to UTF-16, it will now fallback to the equivalent Windows "ANSI" API functions which will interpret the string according to the active Windows code page.
627628

628-
Support for a new environment variable, HDF5_PREFER_WINDOWS_CODE_PAGE, was added in order to instruct HDF5 to prefer interpreting filenames according to the active Windows code page rather than assuming UTF-8 encoding. If this environment variable is set to "1" or "TRUE" (case-insensitive), the active code page will be preferred. If it is unset or set to "0" or "FALSE" (case-insensitive), UTF-8 will be preferred.
629+
Support for a new environment variable, `HDF5_PREFER_WINDOWS_CODE_PAGE`, was added in order to instruct HDF5 to prefer interpreting filenames according to the active Windows code page rather than assuming UTF-8 encoding. If this environment variable is set to "1" or "TRUE" (case-insensitive), the active code page will be preferred. If it is unset or set to "0" or "FALSE" (case-insensitive), UTF-8 will be preferred.
629630

630631
### Fixed an issue with caching in the ROS3 VFD
632+
631633
The ROS3 VFD uses a very simple caching mechanism that caches the first 16MiB of a file during file open and serves later reads from that cache if the offset + length falls within the cached range of bytes. Combinations of offset + length that extended exactly to the end of the cached range of bytes (for example, offset=0 and len=16777216) would end up not being served from the cache due to an incorrect range check. This has now been fixed.
632634

633635
### Fixed an error with `H5Fget_file_image()` with the latest file format
636+
634637
When using `H5Fget_file_image()` on a file created with the latest file format (or any format newer than the earliest), the library failed to recalculate the superblock checksum after changing the access flags in the superblock, causing any subsequent attempt to open the returned file image to fail due to the checksum failing to verify. Fixed `H5Fget_file_image()` to recalculate the checksum.
635638

636639
Fixed GitHub issue [#1915](https://github.com/HDFGroup/hdf5/issues/1915)
@@ -678,8 +681,7 @@ Added Fortran wrapper `h5fdsubfiling_get_file_mapping_f()` for the subfiling fil
678681

679682
### Fixed security issue CVE-2025-2310
680683

681-
A malformed HDF5 file could have an attribute with a recorded name length of zero.This would lead to an overflow and an invalid memory access. An integrity check
682-
has been added to detect this case and safely stop file decoding.
684+
A malformed HDF5 file could have an attribute with a recorded name length of zero.This would lead to an overflow and an invalid memory access. An integrity check has been added to detect this case and safely stop file decoding.
683685

684686
## Java Library
685687

@@ -775,7 +777,7 @@ Added Fortran wrapper `h5fdsubfiling_get_file_mapping_f()` for the subfiling fil
775777

776778
### Added skipping of a few parallel tests for OpenMPI 5.0.5
777779

778-
An issue in OpenMPI 5.0.5 causes a few parallel HDF5 tests (mpiodup, props, fapl_preserve) to fail. These tests are now skipped for that release of OpenMPI. The issue has been fixed in the 5.0.6 release of OpenMPI.
780+
An issue in OpenMPI 5.0.5 causes a few parallel HDF5 tests (mpiodup, props, fapl_preserve) to fail. These tests are now skipped for that release of OpenMPI. The issue has been fixed in the 5.0.6 release of OpenMPI.
779781

780782
# ✨ Support for new platforms and languages
781783

@@ -786,7 +788,7 @@ Current test results are available [here](https://my.cdash.org/index.php?project
786788

787789
# ⛔ Known Problems
788790

789-
- When the library detects and builds in support for the _Float16 datatype, an issue has been observed on at least one MacOS 14 system where the library fails to initialize due to not being able to detect the byte order of the _Float16 type [#4310](https://github.com/HDFGroup/hdf5/issues/4310):
791+
- When the library detects and builds in support for the _Float16 datatype, an issue has been observed on at least one MacOS 14 system where the library fails to initialize due to not being able to detect the byte order of the _Float16 type. See Github issue [#4310](https://github.com/HDFGroup/hdf5/issues/4310):
790792

791793
#5: H5Tinit_float.c line 308 in H5T__fix_order(): failed to detect byte order
792794
major: Datatype
@@ -798,19 +800,19 @@ Current test results are available [here](https://my.cdash.org/index.php?project
798800

799801
- When HDF5 is compiled with NVHPC versions 23.5 - 23.9 (additional versions may also be applicable) and with -O2 (or higher) and -DNDEBUG, test failures occur in the following tests:
800802

801-
H5PLUGIN-filter_plugin <br>
802-
H5TEST-flush2<br>
803-
H5TEST-testhdf5-base<br>
804-
MPI_TEST_t_filters_parallel<br>
803+
- H5PLUGIN-filter_plugin
804+
- H5TEST-flush2
805+
- H5TEST-testhdf5-base
806+
- MPI_TEST_t_filters_parallel
805807

806-
Sporadic failures (even with lower -O levels):<br>
808+
Sporadic failures (even with lower -O levels):
807809

808-
Java JUnit-TestH5Pfapl<br>
809-
Java JUnit-TestH5D<br>
810+
- Java JUnit-TestH5Pfapl
811+
- Java JUnit-TestH5D
810812

811813
Also, NVHPC will fail to compile the test/tselect.c test file with a compiler error of 'use of undefined value' when the optimization level is -O2 or higher.
812814

813-
This is confirmed to be a [bug in the nvc compiler](https://forums.developer.nvidia.com/t/hdf5-no-longer-compiles-with-nv-23-9/269045) that has been fixed as of 23.11. If you are using an affected version of the NVidia compiler, the work-around is to set the optimization level to -O1.
815+
This is confirmed to be a [bug in the nvc compiler](https://forums.developer.nvidia.com/t/hdf5-no-longer-compiles-with-nv-23-9/269045) that has been fixed as of 23.11. If you are using an affected version of the NVidia compiler, the work-around is to set the optimization level to -O1.
814816

815817
- CMake files do not behave correctly with paths containing spaces
816818

0 commit comments

Comments
 (0)