First published: Tue Mar 25 2025(Updated: )
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
libgsf | <=1.14.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2723 has been rated as critical due to its potential to cause a heap-based buffer overflow.
To fix CVE-2025-2723, users should update GNOME libgsf to a version later than 1.14.53.
CVE-2025-2723 is caused by manipulation of the n_alloced_params argument in the gsf_property_settings_collec function.
CVE-2025-2723 affects users of GNOME libgsf versions up to and including 1.14.53.
Yes, local access is required to exploit CVE-2025-2723.