Bugzilla – Bug 1107069
VUL-1: CVE-2018-16438: hdf5: out of bounds read in H5L_extern_query at H5Lexternal.c
Last modified: 2024-07-19 12:41:41 UTC
CVE-2018-16438 An issue was discovered in the HDF HDF5 1.8.20 library. There is an out of bounds read in H5L_extern_query at H5Lexternal.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16438 https://github.com/TeamSeri0us/pocs/tree/master/hdf5/h5stat
No upstream fix is available, yet.
SEGV during NULL pointer read: Program received signal SIGSEGV, Segmentation fault. 0x00007ffff6604880 in H5L_extern_query (link_name=<optimized out>, _udata=0x0, udata_size=0, buf=0x0, buf_size=0) at H5Lexternal.c:515 515 if(((*udata >> 4) & 0x0F) != H5L_EXT_VERSION) (gdb) x/i $pc => 0x7ffff6604880 <H5L_extern_query+140>: movzbl (%rsi),%eax (gdb) i r rsi 0x0 0 (gdb) p udata $1 = (const uint8_t *) 0x0
SUSE-SU-2022:3824-1: An update that fixes 11 vulnerabilities is now available. Category: security (important) Bug References: 1093663,1101475,1101906,1107069,1111598,1125882,1167400,1194366,1194375,1195212,1195215 CVE References: CVE-2018-11205,CVE-2018-13867,CVE-2018-14031,CVE-2018-16438,CVE-2018-17439,CVE-2019-8396,CVE-2020-10812,CVE-2021-45830,CVE-2021-45833,CVE-2021-46242,CVE-2021-46244 JIRA References: Sources used: SUSE Linux Enterprise Module for HPC 12 (src): hdf5_1_10_8-gnu-hpc-1.10.8-3.15.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-3.15.1, hdf5_1_10_8-gnu-openmpi1-hpc-1.10.8-3.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3826-1: An update that fixes 11 vulnerabilities is now available. Category: security (important) Bug References: 1093663,1101475,1101906,1107069,1111598,1125882,1167400,1194366,1194375,1195212,1195215 CVE References: CVE-2018-11205,CVE-2018-13867,CVE-2018-14031,CVE-2018-16438,CVE-2018-17439,CVE-2019-8396,CVE-2020-10812,CVE-2021-45830,CVE-2021-45833,CVE-2021-46242,CVE-2021-46244 JIRA References: Sources used: SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): hdf5_1_10_8-gnu-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150200.8.7.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): hdf5_1_10_8-gnu-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150200.8.7.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150200.8.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3825-1: An update that fixes 11 vulnerabilities is now available. Category: security (important) Bug References: 1093663,1101475,1101906,1107069,1111598,1125882,1167400,1194366,1194375,1195212,1195215 CVE References: CVE-2018-11205,CVE-2018-13867,CVE-2018-14031,CVE-2018-16438,CVE-2018-17439,CVE-2019-8396,CVE-2020-10812,CVE-2021-45830,CVE-2021-45833,CVE-2021-46242,CVE-2021-46244 JIRA References: Sources used: SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src): hdf5_1_10_8-gnu-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150400.3.3.1 SUSE Linux Enterprise Module for HPC 15-SP4 (src): hdf5_1_10_8-gnu-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150400.3.3.1, hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150400.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3827-1: An update that fixes 11 vulnerabilities is now available. Category: security (important) Bug References: 1093663,1101475,1101906,1107069,1111598,1125882,1167400,1194366,1194375,1195212,1195215 CVE References: CVE-2018-11205,CVE-2018-13867,CVE-2018-14031,CVE-2018-16438,CVE-2018-17439,CVE-2019-8396,CVE-2020-10812,CVE-2021-45830,CVE-2021-45833,CVE-2021-46242,CVE-2021-46244 JIRA References: Sources used: openSUSE Leap 15.4 (src): hdf5_1_10_8-gnu-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150100.7.7.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): hdf5_1_10_8-gnu-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150100.7.7.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): hdf5_1_10_8-gnu-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150100.7.7.1, hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150100.7.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3829-1: An update that fixes 11 vulnerabilities is now available. Category: security (important) Bug References: 1093663,1101475,1101906,1107069,1111598,1125882,1167400,1194366,1194375,1195212,1195215 CVE References: CVE-2018-11205,CVE-2018-13867,CVE-2018-14031,CVE-2018-16438,CVE-2018-17439,CVE-2019-8396,CVE-2020-10812,CVE-2021-45830,CVE-2021-45833,CVE-2021-46242,CVE-2021-46244 JIRA References: Sources used: openSUSE Leap 15.4 (src): hdf5_1_10_8-gnu-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 openSUSE Leap 15.3 (src): hdf5_1_10_8-gnu-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src): hdf5_1_10_8-gnu-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 SUSE Linux Enterprise Module for HPC 15-SP3 (src): hdf5_1_10_8-gnu-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1, hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3828-1: An update that fixes 11 vulnerabilities is now available. Category: security (important) Bug References: 1093663,1101475,1101906,1107069,1111598,1125882,1167400,1194366,1194375,1195212,1195215 CVE References: CVE-2018-11205,CVE-2018-13867,CVE-2018-14031,CVE-2018-16438,CVE-2018-17439,CVE-2019-8396,CVE-2020-10812,CVE-2021-45830,CVE-2021-45833,CVE-2021-46242,CVE-2021-46244 JIRA References: Sources used: SUSE Linux Enterprise High Performance Computing 15-LTSS (src): hdf5_1_10_8-gnu-hpc-1.10.8-150000.8.7.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150000.8.7.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150000.8.7.1, hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150000.8.7.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): hdf5_1_10_8-gnu-hpc-1.10.8-150000.8.7.1, hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150000.8.7.1, hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150000.8.7.1, hdf5_1_10_8-gnu-openmpi2-hpc-1.10.8-150000.8.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
All done, closing.