Filtered by vendor Redhat Subscriptions
Filtered by product Enterprise Linux Ai Subscriptions
Total 34 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-32618 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 7.4 High
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__get_native_type in H5Tnative.c, resulting in the corruption of the instruction pointer.
CVE-2024-29165 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 7.4 High
HDF5 through 1.14.3 contains a buffer overflow in H5Z__filter_fletcher32, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-29161 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 8.8 High
HDF5 through 1.14.3 contains a heap buffer overflow in H5A__attr_release_table, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-29160 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 7.4 High
HDF5 through 1.14.3 contains a heap buffer overflow in H5HG__cache_heap_deserialize, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-29159 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 9.8 Critical
HDF5 through 1.14.3 contains a buffer overflow in H5Z__filter_scaleoffset, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-29158 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 7.4 High
HDF5 through 1.14.3 contains a stack buffer overflow in H5FL_arr_malloc, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-29162 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 7.4 High
HDF5 through 1.13.3 and/or 1.14.2 contains a stack buffer overflow in H5HG_read, resulting in denial of service or potential code execution.
CVE-2024-29163 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 7.4 High
HDF5 through 1.14.3 contains a heap buffer overflow in H5T__bit_find, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-29164 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 9.8 Critical
HDF5 through 1.14.3 contains a stack buffer overflow in H5R__decode_heap, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-29157 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-04-18 9.8 Critical
HDF5 through 1.14.3 contains a heap buffer overflow in H5HG_read, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2021-37501 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-03-26 7.5 High
Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c.
CVE-2024-32608 2 Hdfgroup, Redhat 2 Hdf5, Enterprise Linux Ai 2025-03-25 9.8 Critical
HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
CVE-2024-8939 1 Redhat 1 Enterprise Linux Ai 2025-01-14 6.2 Medium
A vulnerability was found in the ilab model serve component, where improper handling of the best_of parameter in the vllm JSON web API can lead to a Denial of Service (DoS). The API used for LLM-based sentence or chat completion accepts a best_of parameter to return the best completion from several options. When this parameter is set to a large value, the API does not handle timeouts or resource exhaustion properly, allowing an attacker to cause a DoS by consuming excessive system resources. This leads to the API becoming unresponsive, preventing legitimate users from accessing the service.
CVE-2024-8768 1 Redhat 1 Enterprise Linux Ai 2024-12-24 7.5 High
A flaw was found in the vLLM library. A completions API request with an empty prompt will crash the vLLM API server, resulting in a denial of service.