Skip to content

Conversation

mattjala
Copy link
Contributor

@mattjala mattjala commented Sep 24, 2025

Malformed files can have a zero name-length, which when subtracted lead to an overflow and an out-of-bounds read.

Check that name length is not too small in addition to checking for an overflow directly.


Important

Fixes overflow and out-of-bounds read in H5O__attr_decode() by ensuring name_len is greater than 1 in H5Oattr.c.

  • Security Fix:
    • In H5O__attr_decode() in H5Oattr.c, added a check to ensure name_len is greater than 1 to prevent overflow and out-of-bounds read.
    • This prevents processing of malformed files with zero-length names.

This description was created by Ellipsis for a5a0b30. You can customize this summary. It will automatically update as commits are pushed.

@mattjala mattjala marked this pull request as draft September 24, 2025 22:11
@nbagha1 nbagha1 added this to the Release 2.0.0 milestone Sep 26, 2025
@mattjala mattjala marked this pull request as ready for review September 26, 2025 23:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Component - C Library Core C library issues (usually in the src directory)
Projects
Status: To be triaged
Development

Successfully merging this pull request may close these issues.

4 participants