{"id":"CVE-2025-2912","details":"A vulnerability was found in HDF5 up to 1.14.6. It has been declared as problematic. Affected by this vulnerability is the function H5O_msg_flush of the file src/H5Omessage.c. The manipulation of the argument oh leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.","modified":"2026-03-18T11:57:40.148209Z","published":"2025-03-28T16:15:30.540Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.301885"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.519966"},{"type":"REPORT","url":"https://github.com/HDFGroup/hdf5/issues/5370"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.301885"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hdfgroup/hdf5","events":[{"introduced":"0"},{"fixed":"a6ff8aed236ee1e1deff6415e88b16c42b22f17c"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.0.0"}]}}],"versions":["before_removing_docs","before_removing_fphdf5","before_removing_mpiposix_vfd","before_removing_tbbt_code","before_signed_unsigned_changes","final_autotools_develop","hdf5-1_0_0","hdf5-1_0_0-alpha2","hdf5-1_0_1","hdf5-1_13_0-rc1","hdf5-1_13_0-rc2","hdf5-1_13_0-rc3","hdf5-1_13_0-rc4","hdf5-1_13_0-rc5","hdf5-1_13_0-rc6","hdf5-1_2_0","hdf5-1_2_0-beta1-update2","hdf5-1_2_0beta","hdf5-1_2_1","hdf5-1_3_0","hdf5-1_3_1","hdf5-1_4_0","hdf5-1_4_1","hdf5-1_6_0","hdf5-1_6_1","hdf5-1_6_2","hdf5-1_8_0-alpha2","hdf5-1_8_0-alpha3","hdf5-1_8_0-alpha4","hdf5-1_8_0-beta1","hdf5-1_8_0-beta2","hdf5-1_8_0-beta3","hdf5-1_8_0-beta4","hdf5-1_8_0-beta5","hdf5-1_9-start","proto1","r1_1beta1","snapshot","vms_last_support_trunk"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-2912.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}