{"id":"CVE-2025-2914","details":"A vulnerability classified as problematic has been found in HDF5 up to 1.14.6. This affects the function H5FS__sinfo_Srialize_Sct_cb of the file src/H5FScache.c. The manipulation of the argument sect leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.","modified":"2026-03-15T15:22:25.223187Z","published":"2025-03-28T17:15:30.510Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.301887"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.520880"},{"type":"REPORT","url":"https://github.com/HDFGroup/hdf5/issues/5379"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.301887"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hdfgroup/hdf5","events":[{"introduced":"0"},{"last_affected":"7bf340440909d468dbb3cf41f0ea0d87f5050cea"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.14.6"}]}}],"versions":["before_removing_docs","before_removing_fphdf5","before_removing_mpiposix_vfd","before_removing_tbbt_code","before_signed_unsigned_changes","hdf5-1.14.5","hdf5-1.14.6","hdf5-1_0_0","hdf5-1_0_0-alpha2","hdf5-1_0_1","hdf5-1_13_0-rc1","hdf5-1_13_0-rc2","hdf5-1_13_0-rc3","hdf5-1_13_0-rc4","hdf5-1_13_0-rc5","hdf5-1_13_0-rc6","hdf5-1_2_0","hdf5-1_2_0-beta1-update2","hdf5-1_2_0beta","hdf5-1_2_1","hdf5-1_3_0","hdf5-1_3_1","hdf5-1_4_0","hdf5-1_4_1","hdf5-1_6_0","hdf5-1_6_1","hdf5-1_6_2","hdf5-1_8_0-alpha2","hdf5-1_8_0-alpha3","hdf5-1_8_0-alpha4","hdf5-1_8_0-beta1","hdf5-1_8_0-beta2","hdf5-1_8_0-beta3","hdf5-1_8_0-beta4","hdf5-1_8_0-beta5","hdf5-1_9-start","hdf5_1.14.5","hdf5_1.14.6","proto1","r1_1beta1","snapshot-1.14","vms_last_support_trunk"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-2914.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}