First published: Tue Mar 25 2025(Updated: )
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
libgsf | <=1.14.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2721 has been classified as a critical vulnerability.
CVE-2025-2721 affects GNOME libgsf versions up to 1.14.53.
To fix CVE-2025-2721, update GNOME libgsf to the latest version available beyond 1.14.53.
CVE-2025-2721 is a heap-based buffer overflow vulnerability.
CVE-2025-2721 requires a local attack approach.