The vulnerability exists due to the library’s failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it. When reading elements from the file into this array, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution. External References: http://www.talosintelligence.com/reports/TALOS-2016-0176/
Created hdf5 tracking bugs for this issue: Affects: fedora-all [bug 1397715] Affects: epel-all [bug 1397716]
Created hdf5 tracking bugs for this issue: Affects: openshift-1 [bug 1470478]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2016-4330