CVE-2016-4330

NameCVE-2016-4330
DescriptionIn the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-771-1, DSA-3727-1
Debian Bugs845301

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
hdf5 (PTS)jessie, jessie (lts)1.8.13+docs-15+deb8u1fixed
stretch (lts), stretch1.10.0-patch1+docs-3+deb9u2fixed
buster (security), buster, buster (lts)1.10.4+repack-10+deb10u1fixed
bullseye1.10.6+repack-4+deb11u1fixed
bookworm1.10.8+repack1-1fixed
sid, trixie1.10.10+repack-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
hdf5sourcewheezy1.8.8-9+deb7u1DLA-771-1
hdf5sourcejessie1.8.13+docs-15+deb8u1DSA-3727-1
hdf5source(unstable)1.10.0-patch1+docs-1845301

Notes

http://www.talosintelligence.com/reports/TALOS-2016-0176/
Fixed by: https://bitbucket.hdfgroup.org/projects/HDFFV/repos/hdf5/commits/2e7e1899d3d7131bcbad65233ba713f6b79e2d69

Search for package or bug name: Reporting problems