GNOME libgsf up to 1.14.53 gsf_property_settings_collec n_alloced_params heap-based overflow 🚫 [False Positive]

Noticeinfo

⚠️ Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all. The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Productinfo

Vendor

Name

Version

License

Website

Timelineinfo

03/24/2025 Advisory disclosed
03/24/2025 +0 days VulDB entry created
04/22/2025 +29 days VulDB entry last update

Sourcesinfo

Vendor: gnome.org

False Positive: Yes

CVE: CVE-2025-2723 (🔒)
GCVE (CVE): GCVE-0-2025-2723
GCVE (VulDB): GCVE-100-300743

Entryinfo

Created: 03/24/2025 01:51 PM
Updated: 04/22/2025 02:30 PM
Changes: 03/24/2025 01:51 PM (52), 03/25/2025 09:29 AM (29), 04/22/2025 02:30 PM (2)
Complete: 🔍
Submitter: ninpwn
Cache ID: 244:EB4:40

Submitinfo

Accepted

  • Submit #520183: Open Source libgsf <=1.14.53 Integer Overflow -> Heap Overflow (gsf_property_settings_collec) (by ninpwn)

Discussion

No comments yet. Languages: en.

Please log in to comment.

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!