Dear Salvatore,
On Sat, 05 Apr 2025 21:11:44 +0200 Salvatore Bonaccorso <carnil@debian.org> wrote:
Source: c-blosc2
Version: 2.17.1+ds-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/Blosc/c-blosc2/issues/656
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Hi,
The following vulnerability was published for c-blosc2.
CVE-2025-29476[0]:
| Buffer Overflow vulnerability in compress_chunk_fuzzer with oss-fuzz
| on commit 16450518afddcb3139de627157208e49bfef6987 in c-blosc2
| v.2.17.0 and before.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-29476
https://www.cve.org/CVERecord?id=CVE-2025-29476
[1] https://github.com/Blosc/c-blosc2/issues/656
Regards,
Salvatore
According to the mentioned CVE record the issue affects c-blosc2 v2.17.
The fix has been merged in in c-blosc2 v2.17.1 which is the version
currently in testing.
My conclusion is the the current version of c-blosc2 in debian is OK so I will close this bug.
Please feel free to re-open if you do not agree.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 481 |
Nodes: | 16 (2 / 14) |
Uptime: | 08:50:23 |
Calls: | 9,538 |
Calls today: | 6 |
Files: | 13,653 |
Messages: | 6,139,038 |
Posted today: | 1 |