{"id":"CVE-2025-2925","summary":"HDF5 H5MM.c H5MM_realloc double free","details":"A vulnerability has been found in HDF5 up to 1.14.6 and classified as problematic. This vulnerability affects the function H5MM_realloc of the file src/H5MM.c. The manipulation of the argument mem leads to double free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.","modified":"2026-05-18T05:56:16.386454507Z","published":"2025-03-28T20:00:11Z","database_specific":{"cna_assigner":"VulDB","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/2xxx/CVE-2025-2925.json","cwe_ids":["CWE-119","CWE-415"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/2xxx/CVE-2025-2925.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-2925"},{"type":"ADVISORY","url":"https://vuldb.com/?id.301900"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.521193"},{"type":"REPORT","url":"https://github.com/HDFGroup/hdf5/issues/5383"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.301900"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hdfgroup/hdf5","events":[{"introduced":"0"},{"last_affected":"0553fb7ac7f03a919c91cdbbd5648b8aadbe05af"},{"last_affected":"577c192518598c7e2945683655feffcdbdf5a91b"},{"last_affected":"2d926cf0426d2ed9403946071d9b05ac8b4dd778"},{"last_affected":"8b5cac6bc498546efa5639f99bb7dbbc1a2d5d90"},{"last_affected":"88429b015e29c59de604b0f552001fb7cb7ed5d0"},{"last_affected":"0fe0459fc24d71be13d5f266513c2832b525671b"},{"last_affected":"7bf340440909d468dbb3cf41f0ea0d87f5050cea"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.14.0"},{"last_affected":"1.14.1"},{"last_affected":"1.14.2"},{"last_affected":"1.14.3"},{"last_affected":"1.14.4"},{"last_affected":"1.14.5"},{"last_affected":"1.14.6"}],"source":"AFFECTED_FIELD"}}],"versions":["hdf5_1.14.6","hdf5-1.14.6","hdf5_1.14.5","hdf5-1.14.5","snapshot-1.14","hdf5_1.14.4","hdf5-1_14_3","hdf5-1_14_3-rc1","hdf5-1_14_2","hdff5-1_14_0","hdff5-1_14-_0","hdf5-1_14_1","1.14.1","hdf5-1_14_0","hdf5-1_13_0-rc6","hdf5-1_13_0-rc5","hdf5-1_13_0-rc4","hdf5-1_13_0-rc3","hdf5-1_13_0-rc2","hdf5-1_13_0-rc1","vms_last_support_trunk","before_removing_mpiposix_vfd","hdf5-1_9-start","hdf5-1_8_0-beta5","hdf5-1_8_0-beta4","hdf5-1_8_0-beta3","hdf5-1_8_0-beta2","hdf5-1_8_0-beta1","hdf5-1_8_0-alpha4","hdf5-1_8_0-alpha3","hdf5-1_8_0-alpha2","before_removing_fphdf5","before_removing_docs","before_removing_tbbt_code","before_signed_unsigned_changes","hdf5-1_6_2","hdf5-1_6_1","hdf5-1_6_0","hdf5-1_4_0","hdf5-1_4_1","hdf5-1_3_1","hdf5-1_3_0","hdf5-1_2_1","hdf5-1_2_0beta","hdf5-1_2_0-beta1-update2","hdf5-1_2_0","hdf5-1_0_1","hdf5-1_0_0","r1_1beta1","hdf5-1_0_0-alpha2","proto1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-2925.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"}]}