{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Medium"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"hdf5 security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for hdf5 is now available for openEuler-20.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"HDF5 is a data model, library, and file format for storing and managing data. It supports an unlimited variety of datatypes, and is designed for flexible and efficient I/O and for high volume and complex data. HDF5 is portable and is extensible, allowing applications to evolve in their use of HDF5. The HDF5 Technology suite includes tools and applications for managing, manipulating, viewing, and analyzing data in the HDF5 format.\n\nSecurity Fix(es):\n\nA heap-based buffer overflow in ReadGifImageDesc() in gifread.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.(CVE-2018-17433)\n\nReadCode() in decompress.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (invalid write access) via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.(CVE-2018-17436)\n\nAn issue was discovered in HDF5 through 1.12.0. A heap-based buffer overflow exists in the function Decompress() located in decompress.c. It can be triggered by sending a crafted file to the gif2h5 binary. It allows an attacker to cause Denial of Service.(CVE-2020-10809)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for hdf5 is now available for openEuler-20.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Medium",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"hdf5",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2023-1986",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1986"
			},
			{
				"summary":"CVE-2018-17433",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2018-17433&packageName=hdf5"
			},
			{
				"summary":"CVE-2018-17436",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2018-17436&packageName=hdf5"
			},
			{
				"summary":"CVE-2020-10809",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2020-10809&packageName=hdf5"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17433"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17436"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10809"
			},
			{
				"summary":"openEuler-SA-2023-1986 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2023/csaf-openeuler-sa-2023-1986.json"
			}
		],
		"title":"An update for hdf5 is now available for openEuler-20.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2023-12-29T14:29:00+08:00",
			"revision_history":[
				{
					"date":"2023-12-29T14:29:00+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T14:29:00+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T14:29:00+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T14:29:00+08:00",
			"id":"openEuler-SA-2023-1986",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"openEuler-20.03-LTS-SP1",
									"name":"openEuler-20.03-LTS-SP1"
								},
								"name":"openEuler-20.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-1.12.1-3.oe1.aarch64.rpm"
								},
								"name":"hdf5-1.12.1-3.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-debuginfo-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-debuginfo-1.12.1-3.oe1.aarch64.rpm"
								},
								"name":"hdf5-debuginfo-1.12.1-3.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-devel-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-devel-1.12.1-3.oe1.aarch64.rpm"
								},
								"name":"hdf5-devel-1.12.1-3.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-debugsource-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-debugsource-1.12.1-3.oe1.aarch64.rpm"
								},
								"name":"hdf5-debugsource-1.12.1-3.oe1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-1.12.1-3.oe1.src.rpm(20.03-LTS-SP1)",
									"name":"hdf5-1.12.1-3.oe1.src.rpm"
								},
								"name":"hdf5-1.12.1-3.oe1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-debuginfo-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-debuginfo-1.12.1-3.oe1.x86_64.rpm"
								},
								"name":"hdf5-debuginfo-1.12.1-3.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-1.12.1-3.oe1.x86_64.rpm"
								},
								"name":"hdf5-1.12.1-3.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-debugsource-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-debugsource-1.12.1-3.oe1.x86_64.rpm"
								},
								"name":"hdf5-debugsource-1.12.1-3.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"hdf5-devel-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"hdf5-devel-1.12.1-3.oe1.x86_64.rpm"
								},
								"name":"hdf5-devel-1.12.1-3.oe1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
					"name":"hdf5-1.12.1-3.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-debuginfo-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
					"name":"hdf5-debuginfo-1.12.1-3.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-devel-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
					"name":"hdf5-devel-1.12.1-3.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-debugsource-1.12.1-3.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
					"name":"hdf5-debugsource-1.12.1-3.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-1.12.1-3.oe1.src.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
					"name":"hdf5-1.12.1-3.oe1.src as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-debuginfo-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
					"name":"hdf5-debuginfo-1.12.1-3.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
					"name":"hdf5-1.12.1-3.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-debugsource-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
					"name":"hdf5-debugsource-1.12.1-3.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"hdf5-devel-1.12.1-3.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64",
					"name":"hdf5-devel-1.12.1-3.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2018-17433",
			"notes":[
				{
					"text":"A heap-based buffer overflow in ReadGifImageDesc() in gifread.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
					"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
					],
					"details":"hdf5 security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1986"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2018-17433"
		},
		{
			"cve":"CVE-2018-17436",
			"notes":[
				{
					"text":"ReadCode() in decompress.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (invalid write access) via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
					"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
					],
					"details":"hdf5 security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1986"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2018-17436"
		},
		{
			"cve":"CVE-2020-10809",
			"notes":[
				{
					"text":"An issue was discovered in HDF5 through 1.12.0. A heap-based buffer overflow exists in the function Decompress() located in decompress.c. It can be triggered by sending a crafted file to the gif2h5 binary. It allows an attacker to cause Denial of Service.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
					"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
					],
					"details":"hdf5 security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1986"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.src",
						"openEuler-20.03-LTS-SP1:hdf5-debuginfo-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-debugsource-1.12.1-3.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:hdf5-devel-1.12.1-3.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2020-10809"
		}
	]
}