CVE-2023-37186
Homebrew vulnerability analysis and mitigation

Overview

C-blosc2 before version 2.9.3 contains a NULL pointer dereference vulnerability (CVE-2023-37186) in the ndlz/ndlz8x8.c file. The vulnerability occurs when a NULL pointer is passed to the memset function (NVD, CVE).

Technical details

The vulnerability is classified as a NULL Pointer Dereference (CWE-476) with a CVSS v3.1 base score of 7.5 (HIGH). The vulnerability affects the memset operation in the ndlz/ndlz8x8.c file when handling NULL pointers. The issue was discovered in the code path where a NULL pointer could be passed to the memset function, leading to a potential system crash (NVD).

Impact

When exploited, this vulnerability can lead to a denial of service condition through application crashes due to the NULL pointer dereference. The CVSS score of 7.5 indicates a high severity impact with no requirements for privileges or user interaction to exploit (NVD).

Mitigation and workarounds

The vulnerability has been patched in c-blosc2 version 2.9.3. Users are advised to upgrade to this version or later to address the security issue. The fix involves proper validation of pointers before passing them to the memset function (GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21693HIGH8.8
  • HomebrewHomebrew
  • iccdev
NoYesJan 07, 2026
CVE-2026-21692HIGH8.8
  • HomebrewHomebrew
  • iccdev
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026
CVE-2026-21691MEDIUM6.5
  • HomebrewHomebrew
  • iccdev
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management