Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-37187 | 1 Blosc | 1 C-blosc2 | 2025-04-25 | N/A | 7.5 HIGH |
C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the zfp/blosc2-zfp.c zfp_acc_decompress. function. | |||||
CVE-2023-37186 | 1 Blosc | 1 C-blosc2 | 2025-04-25 | N/A | 7.5 HIGH |
C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference in ndlz/ndlz8x8.c via a NULL pointer to memset. | |||||
CVE-2020-29367 | 1 Blosc | 1 C-blosc2 | 2025-04-25 | 9.3 HIGH | 7.8 HIGH |
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data. | |||||
CVE-2023-37188 | 1 Blosc | 1 C-blosc2 | 2025-04-25 | N/A | 7.5 HIGH |
C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the function zfp_rate_decompress at zfp/blosc2-zfp.c. | |||||
CVE-2023-37185 | 1 Blosc | 1 C-blosc2 | 2025-04-25 | N/A | 7.5 HIGH |
C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the function zfp_prec_decompress at zfp/blosc2-zfp.c. | |||||
CVE-2024-3204 | 1 Blosc | 1 C-blosc2 | 2025-04-25 | 7.5 HIGH | 7.3 HIGH |
A vulnerability has been found in c-blosc2 up to 2.13.2 and classified as critical. Affected by this vulnerability is the function ndlz4_decompress of the file /src/c-blosc2/plugins/codecs/ndlz/ndlz4x4.c. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.14.3 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-259051. | |||||
CVE-2024-3203 | 1 Blosc | 1 C-blosc2 | 2025-04-25 | 7.5 HIGH | 7.3 HIGH |
A vulnerability, which was classified as critical, was found in c-blosc2 up to 2.13.2. Affected is the function ndlz8_decompress of the file /src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.14.3 is able to address this issue. It is recommended to upgrade the affected component. VDB-259050 is the identifier assigned to this vulnerability. |