Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 16 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:* |
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hdfgroup
Hdfgroup hdf5 |
|
| Vendors & Products |
Hdfgroup
Hdfgroup hdf5 |
Mon, 13 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 10 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file parsed by HDF5 can trigger a write-based heap buffer overflow condition in the H5T__ref_mem_setnull method. This can lead to a denial-of-service condition, and potentially further issues such as remote code execution depending on the practical exploitability of the heap overflow against modern operating systems. | |
| Title | HDF5 H5T__ref_mem_setnull Heap Buffer Overflow | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-14T14:50:46.566Z
Reserved: 2026-03-03T17:50:11.242Z
Link: CVE-2026-29043
Updated: 2026-04-14T14:50:42.601Z
Status : Analyzed
Published: 2026-04-10T16:16:30.693
Modified: 2026-04-16T19:40:13.963
Link: CVE-2026-29043
OpenCVE Enrichment
Updated: 2026-04-13T14:27:07Z