Bug#1102152: c-blosc2: CVE-2025-29476
Salvatore Bonaccorso
carnil at debian.org
Sun Apr 6 19:27:19 BST 2025
Hi Antonio,
On Sun, Apr 06, 2025 at 08:07:50PM +0200, Antonio Valentino wrote:
> Dear Salvatore,
>
> On Sat, 05 Apr 2025 21:11:44 +0200 Salvatore Bonaccorso <carnil at debian.org>
> wrote:
> > Source: c-blosc2
> > Version: 2.17.1+ds-1
> > Severity: important
> > Tags: security upstream
> > Forwarded: https://github.com/Blosc/c-blosc2/issues/656
> > X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
> >
> > Hi,
> >
> > The following vulnerability was published for c-blosc2.
> >
> > CVE-2025-29476[0]:
> > | Buffer Overflow vulnerability in compress_chunk_fuzzer with oss-fuzz
> > | on commit 16450518afddcb3139de627157208e49bfef6987 in c-blosc2
> > | v.2.17.0 and before.
> >
> >
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> >
> > For further information see:
> >
> > [0] https://security-tracker.debian.org/tracker/CVE-2025-29476
> > https://www.cve.org/CVERecord?id=CVE-2025-29476
> > [1] https://github.com/Blosc/c-blosc2/issues/656
> >
> > Regards,
> > Salvatore
> >
>
> According to the mentioned CVE record the issue affects c-blosc2 v2.17.
> The fix has been merged in in c-blosc2 v2.17.1 which is the version
> currently in testing.
>
> My conclusion is the the current version of c-blosc2 in debian is OK so I
> will close this bug.
> Please feel free to re-open if you do not agree.
No, no need to reopen, I think my triage and uncertainity about the
fix overlapped with the acknowledgement in the upstream issue as
https://github.com/Blosc/c-blosc2/issues/656#issuecomment-2780717832 .
So it looks correct that this is fixed in v2.17.1 upstream.
I agree with your conclusion.
I tried to fix the meatadata of the bug and updated as well the
security-tracker accordingly.
Regards,
Salvatore
More information about the debian-science-maintainers
mailing list