Dear Salvatore,
On Sat, 05 Apr 2025 21:11:44 +0200 Salvatore Bonaccorso
<car...@debian.org> wrote:
Source: c-blosc2
Version: 2.17.1+ds-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/Blosc/c-blosc2/issues/656
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi,
The following vulnerability was published for c-blosc2.
CVE-2025-29476[0]:
| Buffer Overflow vulnerability in compress_chunk_fuzzer with oss-fuzz
| on commit 16450518afddcb3139de627157208e49bfef6987 in c-blosc2
| v.2.17.0 and before.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-29476
https://www.cve.org/CVERecord?id=CVE-2025-29476
[1] https://github.com/Blosc/c-blosc2/issues/656
Regards,
Salvatore
According to the mentioned CVE record the issue affects c-blosc2 v2.17.
The fix has been merged in in c-blosc2 v2.17.1 which is the version
currently in testing.
My conclusion is the the current version of c-blosc2 in debian is OK so
I will close this bug.
Please feel free to re-open if you do not agree.
kind regards
--
Antonio Valentino