deleted file mode 100644
@@ -1,47 +0,0 @@
-From 183c8aeb601a02a38dd6815bcb651a7317b1b647 Mon Sep 17 00:00:00 2001
-From: Glenn Song <43005495+glennsong09@users.noreply.github.com>
-Date: Thu, 9 Oct 2025 07:51:49 -0500
-Subject: [PATCH] Fix CVE-2025-2153 (#5795)
-
-This PR fixes #5329. Previously, the message flags field was able to be modified such that a message that is not sharable according to the share_flags field in H5O_msg_class_t could be treated as sharable. A check has been added to make sure messages that are not sharable can't be modified so that they indicate they can be shared.
-
-The bug was first reproduced using the fuzzer and the POC file from #5329. With this change, the heap based buffer overflow no longer occurs.
-
-CVE: CVE-2025-2153
-Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/38954615fc079538aa45d48097625a6d76aceef0]
-
-Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
----
- src/H5Ocache.c | 4 ++--
- src/H5Omessage.c | 3 +++
- 2 files changed, 5 insertions(+), 2 deletions(-)
-
-diff --git a/src/H5Ocache.c b/src/H5Ocache.c
-index 87f321c..12c30cf 100644
---- a/src/H5Ocache.c
-+++ b/src/H5Ocache.c
-@@ -1399,8 +1399,8 @@ H5O__chunk_deserialize(H5O_t *oh, haddr_t addr, size_t chunk_size, const uint8_t
- else {
- /* Check for message of unshareable class marked as "shareable"
- */
-- if ((flags & H5O_MSG_FLAG_SHAREABLE) && H5O_msg_class_g[id] &&
-- !(H5O_msg_class_g[id]->share_flags & H5O_SHARE_IS_SHARABLE))
-+ if (((flags & H5O_MSG_FLAG_SHARED) || (flags & H5O_MSG_FLAG_SHAREABLE)) &&
-+ H5O_msg_class_g[id] && !(H5O_msg_class_g[id]->share_flags & H5O_SHARE_IS_SHARABLE))
- HGOTO_ERROR(H5E_OHDR, H5E_CANTLOAD, FAIL,
- "message of unshareable class flagged as shareable");
-
-diff --git a/src/H5Omessage.c b/src/H5Omessage.c
-index 7190e46..fb9006c 100644
---- a/src/H5Omessage.c
-+++ b/src/H5Omessage.c
-@@ -354,6 +354,9 @@ H5O__msg_write_real(H5F_t *f, H5O_t *oh, const H5O_msg_class_t *type, unsigned m
- */
- assert(!(mesg_flags & H5O_MSG_FLAG_DONTSHARE));
-
-+ /* Sanity check to see if the type is not sharable */
-+ assert(type->share_flags & H5O_SHARE_IS_SHARABLE);
-+
- /* Remove the old message from the SOHM index */
- /* (It would be more efficient to try to share the message first, then
- * delete it (avoiding thrashing the index in the case the ref.
deleted file mode 100644
@@ -1,41 +0,0 @@
-From 7cc3c76f681fb4ca739457950352654aecd647a9 Mon Sep 17 00:00:00 2001
-From: Matt L <124107509+mattjala@users.noreply.github.com>
-Date: Thu, 9 Oct 2025 16:10:23 -0500
-Subject: [PATCH] Fix CVE-2025-2310 (#5872)
-
-Malformed files can have a zero name-length, which when subtracted lead to an overflow and an out-of-bounds read.
-
-Check that name length is not too small in addition to checking for an overflow directly.
-
-CVE: CVE-2025-2310
-Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/6c86f97e03c6dc7d7bd2bae9acc422bdc3438ff4]
-
-Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
----
- src/H5Oattr.c | 6 ++++++
- 1 file changed, 6 insertions(+)
-
-diff --git a/src/H5Oattr.c b/src/H5Oattr.c
-index 6d1d237..2f8c259 100644
---- a/src/H5Oattr.c
-+++ b/src/H5Oattr.c
-@@ -167,6 +167,11 @@ H5O__attr_decode(H5F_t *f, H5O_t *open_oh, unsigned H5_ATTR_UNUSED mesg_flags, u
- if (H5_IS_BUFFER_OVERFLOW(p, 2, p_end))
- HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "ran off end of input buffer while decoding");
- UINT16DECODE(p, name_len); /* Including null */
-+
-+ /* Verify that retrieved name length (including null byte) is valid */
-+ if (name_len <= 1)
-+ HGOTO_ERROR(H5E_OHDR, H5E_CANTDECODE, NULL, "decoded name length is invalid");
-+
- if (H5_IS_BUFFER_OVERFLOW(p, 2, p_end))
- HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "ran off end of input buffer while decoding");
- UINT16DECODE(p, attr->shared->dt_size);
-@@ -190,6 +195,7 @@ H5O__attr_decode(H5F_t *f, H5O_t *open_oh, unsigned H5_ATTR_UNUSED mesg_flags, u
- */
- if (H5_IS_BUFFER_OVERFLOW(p, name_len, p_end))
- HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "ran off end of input buffer while decoding");
-+
- if (NULL == (attr->shared->name = H5MM_strndup((const char *)p, name_len - 1)))
- HGOTO_ERROR(H5E_RESOURCE, H5E_NOSPACE, NULL, "memory allocation failed");
-
deleted file mode 100644
@@ -1,36 +0,0 @@
-From f76c5adea55edec75680fdd7365cc97abc112d0e Mon Sep 17 00:00:00 2001
-From: Glenn Song <43005495+glennsong09@users.noreply.github.com>
-Date: Mon, 15 Sep 2025 07:56:54 -0500
-Subject: [PATCH] Fix CVE-2025-2924 (#5814)
-
-CVE: CVE-2025-2924
-Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/0a57195ca67d278f1cf7d01566c121048e337a59]
-
-Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
----
- src/H5HLcache.c | 5 +++++
- 1 file changed, 5 insertions(+)
-
-diff --git a/src/H5HLcache.c b/src/H5HLcache.c
-index d0836fe..7f412d2 100644
---- a/src/H5HLcache.c
-+++ b/src/H5HLcache.c
-@@ -225,6 +225,7 @@ H5HL__fl_deserialize(H5HL_t *heap)
- /* check arguments */
- assert(heap);
- assert(!heap->freelist);
-+ HDcompile_assert(sizeof(hsize_t) == sizeof(uint64_t));
-
- /* Build free list */
- free_block = heap->free_block;
-@@ -232,6 +233,10 @@ H5HL__fl_deserialize(H5HL_t *heap)
- const uint8_t *image; /* Pointer into image buffer */
-
- /* Sanity check */
-+
-+ if (free_block > UINT64_MAX - (2 * heap->sizeof_size))
-+ HGOTO_ERROR(H5E_HEAP, H5E_BADRANGE, FAIL, "decoded heap block address overflow");
-+
- if ((free_block + (2 * heap->sizeof_size)) > heap->dblk_size)
- HGOTO_ERROR(H5E_HEAP, H5E_BADRANGE, FAIL, "bad heap free list");
-
deleted file mode 100644
@@ -1,52 +0,0 @@
-From ad959fdac99810ea64504d7bdfc7724c5ca25e21 Mon Sep 17 00:00:00 2001
-From: Glenn Song <43005495+glennsong09@users.noreply.github.com>
-Date: Thu, 9 Oct 2025 14:48:55 -0500
-Subject: [PATCH] Fix CVE-2025-2925 (#5739)
-
-This PR fixes issue #5383, which was occurring due to actual_len + H5C_IMAGE_EXTRA_SPACE being 0. When realloc was called, it freed image, but gets sent to done before new_image can be assigned to image. Because the pointer for image isn't null, it attempts to free it here again, causing the double free to occur. This PR addresses Quincey's concern and fixes the issue while preserving new_image and image.
-
-The bug was first reproduced using the fuzzer and the POC file from #5383. With this change, the double free no longer occurs.
-
-CVE: CVE-2025-2925
-Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/4310c19608455c17a213383d07715efb2918defc]
-
-Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
----
- src/H5Centry.c | 10 ++++++++++
- 1 file changed, 10 insertions(+)
-
-diff --git a/src/H5Centry.c b/src/H5Centry.c
-index 1ca7479..77bc00d 100644
---- a/src/H5Centry.c
-+++ b/src/H5Centry.c
-@@ -1051,9 +1051,14 @@ H5C__load_entry(H5F_t *f,
- */
- do {
- if (actual_len != len) {
-+ /* Verify that the length isn't a bad value */
-+ if (len == 0)
-+ HGOTO_ERROR(H5E_CACHE, H5E_BADVALUE, NULL, "len is a bad value");
-+
- if (NULL == (new_image = H5MM_realloc(image, len + H5C_IMAGE_EXTRA_SPACE)))
- HGOTO_ERROR(H5E_CACHE, H5E_CANTALLOC, NULL, "image null after H5MM_realloc()");
- image = (uint8_t *)new_image;
-+
- #if H5C_DO_MEMORY_SANITY_CHECKS
- H5MM_memcpy(image + len, H5C_IMAGE_SANITY_VALUE, H5C_IMAGE_EXTRA_SPACE);
- #endif /* H5C_DO_MEMORY_SANITY_CHECKS */
-@@ -1104,10 +1109,15 @@ H5C__load_entry(H5F_t *f,
- if (H5C__verify_len_eoa(f, type, addr, &actual_len, true) < 0)
- HGOTO_ERROR(H5E_CACHE, H5E_BADVALUE, NULL, "actual_len exceeds EOA");
-
-+ /* Verify that the length isn't 0 */
-+ if (actual_len == 0)
-+ HGOTO_ERROR(H5E_CACHE, H5E_BADVALUE, NULL, "actual_len is a bad value");
-+
- /* Expand buffer to new size */
- if (NULL == (new_image = H5MM_realloc(image, actual_len + H5C_IMAGE_EXTRA_SPACE)))
- HGOTO_ERROR(H5E_CACHE, H5E_CANTALLOC, NULL, "image null after H5MM_realloc()");
- image = (uint8_t *)new_image;
-+
- #if H5C_DO_MEMORY_SANITY_CHECKS
- H5MM_memcpy(image + actual_len, H5C_IMAGE_SANITY_VALUE, H5C_IMAGE_EXTRA_SPACE);
- #endif /* H5C_DO_MEMORY_SANITY_CHECKS */
deleted file mode 100644
@@ -1,87 +0,0 @@
-From 7159488b73fb429a78f79763f7b3775a3c160fad Mon Sep 17 00:00:00 2001
-From: bmribler <39579120+bmribler@users.noreply.github.com>
-Date: Fri, 26 Sep 2025 11:46:50 -0400
-Subject: [PATCH] Fixes CVE-2025-6750 (#5856)
-
-* Fixes CVE-2025-6750
-
-A heap buffer overflow occurred because an mtime message was not properly decoded, resulting in a buffer of size 0 being passed into the encoder.
-
-This PR added decoding for both old and new mtime messages which will allow invalid message size to be detected.
-
-Fixes #5549
-
-CVE: CVE-2025-6750
-Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/86149a098837a37b2513746e9baf84010f75fb54]
-
-Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
----
- src/H5Ocache.c | 41 +++++++++++++++++++++++++++++++++++------
- 1 file changed, 35 insertions(+), 6 deletions(-)
-
-diff --git a/src/H5Ocache.c b/src/H5Ocache.c
-index 12c30cf..e6095a7 100644
---- a/src/H5Ocache.c
-+++ b/src/H5Ocache.c
-@@ -1265,6 +1265,9 @@ H5O__chunk_deserialize(H5O_t *oh, haddr_t addr, size_t chunk_size, const uint8_t
- if (mesg_size != H5O_ALIGN_OH(oh, mesg_size))
- HGOTO_ERROR(H5E_OHDR, H5E_CANTLOAD, FAIL, "message not aligned");
-
-+ if (H5_IS_BUFFER_OVERFLOW(chunk_image, mesg_size, p_end))
-+ HGOTO_ERROR(H5E_OHDR, H5E_BADVALUE, FAIL, "message size exceeds buffer end");
-+
- /* Message flags */
- if (H5_IS_BUFFER_OVERFLOW(chunk_image, 1, p_end))
- HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, FAIL, "ran off end of input buffer while decoding");
-@@ -1297,12 +1300,6 @@ H5O__chunk_deserialize(H5O_t *oh, haddr_t addr, size_t chunk_size, const uint8_t
- }
- }
-
-- /* Try to detect invalidly formatted object header message that
-- * extends past end of chunk.
-- */
-- if (chunk_image + mesg_size > eom_ptr)
-- HGOTO_ERROR(H5E_OHDR, H5E_CANTINIT, FAIL, "corrupt object header");
--
- /* Increment count of null messages */
- if (H5O_NULL_ID == id)
- nullcnt++;
-@@ -1449,6 +1446,38 @@ H5O__chunk_deserialize(H5O_t *oh, haddr_t addr, size_t chunk_size, const uint8_t
- HGOTO_ERROR(H5E_OHDR, H5E_CANTSET, FAIL, "can't decode refcount");
- oh->nlink = *refcount;
- }
-+ /* Check if message is an old mtime message */
-+ else if (H5O_MTIME_ID == id) {
-+ time_t *mtime = NULL;
-+
-+ /* Decode mtime message */
-+ mtime =
-+ (time_t *)(H5O_MSG_MTIME->decode)(udata->f, NULL, 0, &ioflags, mesg->raw_size, mesg->raw);
-+
-+ /* Save the decoded old format mtime */
-+ if (!mtime)
-+ HGOTO_ERROR(H5E_OHDR, H5E_CANTDECODE, FAIL, "can't decode old format mtime");
-+
-+ /* Save 'native' form of mtime message and its value */
-+ mesg->native = mtime;
-+ oh->ctime = *mtime;
-+ }
-+ /* Check if message is an new mtime message */
-+ else if (H5O_MTIME_NEW_ID == id) {
-+ time_t *mtime = NULL;
-+
-+ /* Decode mtime message */
-+ mtime = (time_t *)(H5O_MSG_MTIME_NEW->decode)(udata->f, NULL, 0, &ioflags, mesg->raw_size,
-+ mesg->raw);
-+
-+ /* Save the decoded new format mtime */
-+ if (!mtime)
-+ HGOTO_ERROR(H5E_OHDR, H5E_CANTDECODE, FAIL, "can't decode new format mtime");
-+
-+ /* Save 'native' form of mtime message and its value */
-+ mesg->native = mtime;
-+ oh->ctime = *mtime;
-+ }
- /* Check if message is a link message */
- else if (H5O_LINK_ID == id) {
- /* Increment the count of link messages */
deleted file mode 100644
@@ -1,47 +0,0 @@
-From 0354419c3b5c6832c994b005903372f156b5fddb Mon Sep 17 00:00:00 2001
-From: bmribler <39579120+bmribler@users.noreply.github.com>
-Date: Wed, 13 Aug 2025 14:45:41 -0400
-Subject: [PATCH] Refix of the attempts in PR-5209 (#5722)
-
-This PR addresses the root cause of the issue by adding a sanity-check immediately
-after reading the file space page size from the file.
-
-The same fuzzer in GH-5376 was used to verify that the assert before the vulnerability
-had occurred and that an error indicating a corrupted file space page size replaced it.
-
-CVE: CVE-2025-2914
-Upstream-Status: Backport [https://github.com/HDFGroup/hdf5/commit/804f3bace997e416917b235dbd3beac3652a8a05]
-
-Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
----
- src/H5Fsuper.c | 2 ++
- src/H5Ofsinfo.c | 3 +++
- 2 files changed, 5 insertions(+)
-
-diff --git a/src/H5Fsuper.c b/src/H5Fsuper.c
-index d9fe3a7..1c8dc6c 100644
---- a/src/H5Fsuper.c
-+++ b/src/H5Fsuper.c
-@@ -746,6 +746,8 @@ H5F__super_read(H5F_t *f, H5P_genplist_t *fa_plist, bool initial_read)
- if (!(flags & H5O_MSG_FLAG_WAS_UNKNOWN)) {
- H5O_fsinfo_t fsinfo; /* File space info message from superblock extension */
-
-+ memset(&fsinfo, 0, sizeof(H5O_fsinfo_t));
-+
- /* f->shared->null_fsm_addr: Whether to drop free-space to the floor */
- /* The h5clear tool uses this property to tell the library
- * to drop free-space to the floor
-diff --git a/src/H5Ofsinfo.c b/src/H5Ofsinfo.c
-index 5b69235..2bb6ea6 100644
---- a/src/H5Ofsinfo.c
-+++ b/src/H5Ofsinfo.c
-@@ -182,6 +182,9 @@ H5O__fsinfo_decode(H5F_t *f, H5O_t H5_ATTR_UNUSED *open_oh, unsigned H5_ATTR_UNU
- if (H5_IS_BUFFER_OVERFLOW(p, H5F_sizeof_size(f), p_end))
- HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "ran off end of input buffer while decoding");
- H5F_DECODE_LENGTH(f, p, fsinfo->page_size); /* File space page size */
-+ /* Basic sanity check */
-+ if (fsinfo->page_size == 0 || fsinfo->page_size > H5F_FILE_SPACE_PAGE_SIZE_MAX)
-+ HGOTO_ERROR(H5E_OHDR, H5E_BADVALUE, NULL, "invalid page size in file space info");
-
- if (H5_IS_BUFFER_OVERFLOW(p, 2, p_end))
- HGOTO_ERROR(H5E_OHDR, H5E_OVERFLOW, NULL, "ran off end of input buffer while decoding");
@@ -9,46 +9,45 @@ to improve reproducibility.
Upstream-Status: Inappropriate [oe specific]
Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
+
+Updated for v2.0.0
+Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
+
---
src/libhdf5.settings.cmake.in | 18 +++++++++---------
1 file changed, 9 insertions(+), 9 deletions(-)
-diff --git a/config/cmake/libhdf5.settings.cmake.in b/config/cmake/libhdf5.settings.cmake.in
+diff --git a/src/libhdf5.settings.in b/src/libhdf5.settings.in
index deb07ed..6f255c4 100644
---- a/src/libhdf5.settings.cmake.in
-+++ b/src/libhdf5.settings.cmake.in
-@@ -23,23 +23,23 @@ Linking Options:
- ----------------
- Libraries: @BUILD_NAME_EXT@
- Statically Linked Executables: @BUILD_STATIC_EXECS@
-- LDFLAGS: @CMAKE_SHARED_LINKER_FLAGS@
-+ LDFLAGS:
- H5_LDFLAGS: @H5_LDFLAGS@
- AM_LDFLAGS: @AM_LDFLAGS@
- Extra libraries: @LINK_LIBS@
-- Archiver: @CMAKE_AR@
-- AR_FLAGS:
-- Ranlib: @CMAKE_RANLIB@
-+ Archiver:
-+ AR_FLAGS:
-+ Ranlib:
-
+--- a/src/libhdf5.settings.in
++++ b/src/libhdf5.settings.in
+@@ -4,7 +4,7 @@
+ General Information:
+ -------------------
+ HDF5 Version: @HDF5_PACKAGE_VERSION_STRING@
+- Configured on: @CONFIG_DATE@
++ Configured on:
+ Configured by: @CMAKE_GENERATOR@
+ Host system: @CMAKE_HOST_SYSTEM@
+ Uname information: @CMAKE_SYSTEM_NAME@
+@@ -34,12 +34,12 @@
Languages:
----------
C: YES
- C Compiler: @CMAKE_C_COMPILER@ @CMAKE_C_COMPILER_VERSION@
+- CPPFLAGS: @CPPFLAGS@
+ C Compiler:
- CPPFLAGS: @CPPFLAGS@
++ CPPFLAGS:
H5_CPPFLAGS: @H5_CPPFLAGS@
AM_CPPFLAGS: @AM_CPPFLAGS@
-- CFLAGS: @CMAKE_C_FLAGS@
+- CFLAGS: @CMAKE_C_FLAGS@ @HDF5_BUILD_MODE_C_FLAGS@
- H5_CFLAGS: @HDF5_CMAKE_C_FLAGS@
+ CFLAGS:
+ H5_CFLAGS:
AM_CFLAGS: @AM_CFLAGS@
Shared C Library: @H5_ENABLE_SHARED_LIB@
Static C Library: @H5_ENABLE_STATIC_LIB@
-@@ -51,11 +51,11 @@ Languages:
+@@ -51,11 +51,11 @@
AM Fortran Flags: @AM_FCFLAGS@
Shared Fortran Library: @H5_ENABLE_SHARED_LIB@
Static Fortran Library: @H5_ENABLE_STATIC_LIB@
@@ -57,11 +56,8 @@ index deb07ed..6f255c4 100644
C++: @HDF5_BUILD_CPP_LIB@
C++ Compiler: @CMAKE_CXX_COMPILER@ @CMAKE_CXX_COMPILER_VERSION@
-- C++ Flags: @CMAKE_CXX_FLAGS@
+- C++ Flags: @CMAKE_CXX_FLAGS@ @HDF5_BUILD_MODE_CXX_FLAGS@
+ C++ Flags:
H5 C++ Flags: @HDF5_CMAKE_CXX_FLAGS@
AM C++ Flags: @AM_CXXFLAGS@
Shared C++ Library: @H5_ENABLE_SHARED_LIB@
-2.25.1
-
@@ -6,18 +6,23 @@ Subject: [PATCH 2/2] Remove suffix `-shared' from shared library name
Upstream-Status: Inappropriate [OE specific]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
+
+Adapted to v2.0.0
+Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
+
---
CMakeLists.txt | 24 ++++++++++++------------
1 file changed, 12 insertions(+), 12 deletions(-)
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
-@@ -191,19 +191,19 @@ set (HDF5_HL_F90_C_LIB_TARGET "${HDF
- set (HDF5_JAVA_JNI_LIB_TARGET "${HDF5_JAVA_JNI_LIB_CORENAME}")
- set (HDF5_JAVA_HDF5_LIB_TARGET "${HDF5_JAVA_HDF5_LIB_CORENAME}")
- set (HDF5_JAVA_TEST_LIB_TARGET "${HDF5_JAVA_TEST_LIB_CORENAME}")
+@@ -278,20 +278,20 @@
+ set (HDF5_F90_C_TEST_LIB_TARGET "${HDF5_F90_C_TEST_LIB_CORENAME}-static")
+ set (HDF5_HL_F90_LIB_TARGET "${HDF5_HL_F90_LIB_CORENAME}-static")
+ set (HDF5_HL_F90_C_LIB_TARGET "${HDF5_HL_F90_C_LIB_CORENAME}-static")
-set (HDF5_LIBSH_TARGET "${HDF5_LIB_CORENAME}-shared")
-set (HDF5_TEST_LIBSH_TARGET "${HDF5_TEST_LIB_CORENAME}-shared")
+-set (HDF5_TEST_PAR_LIBSH_TARGET "${HDF5_TEST_PAR_LIB_CORENAME}-shared")
-set (HDF5_CPP_LIBSH_TARGET "${HDF5_CPP_LIB_CORENAME}-shared")
-set (HDF5_HL_LIBSH_TARGET "${HDF5_HL_LIB_CORENAME}-shared")
-set (HDF5_HL_CPP_LIBSH_TARGET "${HDF5_HL_CPP_LIB_CORENAME}-shared")
@@ -31,6 +36,7 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
-set (HDF5_HL_F90_C_LIBSH_TARGET "${HDF5_HL_F90_C_LIB_CORENAME}-shared")
+set (HDF5_LIBSH_TARGET "${HDF5_LIB_CORENAME}")
+set (HDF5_TEST_LIBSH_TARGET "${HDF5_TEST_LIB_CORENAME}")
++set (HDF5_TEST_PAR_LIBSH_TARGET "${HDF5_TEST_PAR_LIB_CORENAME}")
+set (HDF5_CPP_LIBSH_TARGET "${HDF5_CPP_LIB_CORENAME}")
+set (HDF5_HL_LIBSH_TARGET "${HDF5_HL_LIB_CORENAME}")
+set (HDF5_HL_CPP_LIBSH_TARGET "${HDF5_HL_CPP_LIB_CORENAME}")
@@ -42,6 +48,6 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
+set (HDF5_F90_C_TEST_LIBSH_TARGET "${HDF5_F90_C_TEST_LIB_CORENAME}")
+set (HDF5_HL_F90_LIBSH_TARGET "${HDF5_HL_F90_LIB_CORENAME}")
+set (HDF5_HL_F90_C_LIBSH_TARGET "${HDF5_HL_F90_C_LIB_CORENAME}")
-
- #-----------------------------------------------------------------------------
- # Define some CMake variables for use later in the project
+ set (HDF5_JAVA_JNI_LIB_TARGET "${HDF5_JAVA_JNI_LIB_CORENAME}")
+ set (HDF5_JAVA_HDF5_LIB_TARGET "${HDF5_JAVA_HDF5_LIB_CORENAME}")
+ set (HDF5_JAVA_TEST_LIB_TARGET "${HDF5_JAVA_TEST_LIB_CORENAME}")
similarity index 65%
rename from meta-oe/recipes-support/hdf5/hdf5_1.14.6.bb
rename to meta-oe/recipes-support/hdf5/hdf5_2.0.0.bb
@@ -4,24 +4,18 @@ extremely large and complex data collections"
HOMEPAGE = "https://www.hdfgroup.org/"
SECTION = "libs"
-LICENSE = "HDF5"
-LIC_FILES_CHKSUM = "file://COPYING;md5=adebb1ecf1b3b80c13359e18ef67301e"
+LICENSE = "BSD-3-Clause"
+LIC_FILES_CHKSUM = "file://LICENSE;md5=71a191398102f76050a4e56e78cb4891"
inherit cmake siteinfo qemu multilib_header multilib_script
DEPENDS += "qemu-native zlib"
-SRC_URI = "https://support.hdfgroup.org/releases/hdf5/v1_14/v1_14_6/downloads/${BPN}-${PV}.tar.gz \
+SRC_URI = "https://support.hdfgroup.org/releases/hdf5/v2_0/v2_0_0/downloads/${BPN}-${PV}.tar.gz \
file://0002-Remove-suffix-shared-from-shared-library-name.patch \
file://0001-cmake-remove-build-flags.patch \
- file://0001-Fix-CVE-2025-2153-5795.patch \
- file://0001-Fix-CVE-2025-2310-5872.patch \
- file://0001-Refix-of-the-attempts-in-PR-5209-5722.patch \
- file://0001-Fix-CVE-2025-2924-5814.patch \
- file://0001-Fix-CVE-2025-2925-5739.patch \
- file://0001-Fixes-CVE-2025-6750-5856.patch \
"
-SRC_URI[sha256sum] = "e4defbac30f50d64e1556374aa49e574417c9e72c6b1de7a4ff88c4b1bea6e9b"
+SRC_URI[sha256sum] = "6e45a4213cb11bb5860e1b0a7645688ab55562cc2d55c6ff9bcb0984ed12b22b"
FILES:${PN} += "${libdir}/libhdf5.settings ${datadir}/*"
@@ -58,11 +52,6 @@ do_configure:append() {
do_install:append() {
# Used for generating config files on target
oe_multilib_header H5pubconf.h
- # remove the buildpath
- sed -i -e 's|${RECIPE_SYSROOT}||g' ${D}${libdir}/pkgconfig/hdf5.pc
- sed -i -e 's|${RECIPE_SYSROOT}||g' ${D}${libdir}/cmake/hdf5-targets.cmake
- sed -i -e 's|${RECIPE_SYSROOT_NATIVE}||g' ${D}${bindir}/h5hlcc
- sed -i -e 's|${RECIPE_SYSROOT_NATIVE}||g' ${D}${bindir}/h5cc
}
BBCLASSEXTEND = "native"
Drop patches that were incorporated in this release. License-Update: Switched to 3-clause BSD license: https://github.com/HDFGroup/hdf5/commit/edd7bea821b63f7d09e29296d341a5d6965012f9 Release notes: https://github.com/HDFGroup/hdf5/releases/tag/2.0.0 Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- .../files/0001-Fix-CVE-2025-2153-5795.patch | 47 ---------- .../files/0001-Fix-CVE-2025-2310-5872.patch | 41 --------- .../files/0001-Fix-CVE-2025-2924-5814.patch | 36 -------- .../files/0001-Fix-CVE-2025-2925-5739.patch | 52 ----------- .../files/0001-Fixes-CVE-2025-6750-5856.patch | 87 ------------------- ...efix-of-the-attempts-in-PR-5209-5722.patch | 47 ---------- .../files/0001-cmake-remove-build-flags.patch | 48 +++++----- ...ffix-shared-from-shared-library-name.patch | 20 +++-- .../hdf5/{hdf5_1.14.6.bb => hdf5_2.0.0.bb} | 19 +--- 9 files changed, 39 insertions(+), 358 deletions(-) delete mode 100644 meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2153-5795.patch delete mode 100644 meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2310-5872.patch delete mode 100644 meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2924-5814.patch delete mode 100644 meta-oe/recipes-support/hdf5/files/0001-Fix-CVE-2025-2925-5739.patch delete mode 100644 meta-oe/recipes-support/hdf5/files/0001-Fixes-CVE-2025-6750-5856.patch delete mode 100644 meta-oe/recipes-support/hdf5/files/0001-Refix-of-the-attempts-in-PR-5209-5722.patch rename meta-oe/recipes-support/hdf5/{hdf5_1.14.6.bb => hdf5_2.0.0.bb} (65%)