Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-2721

Опубликовано: 25 мар. 2025
Источник: ubuntu
Приоритет: medium

Описание

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.

РелизСтатусПримечание
devel

not-affected

esm-apps/bionic

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

not-affected

esm-infra/focal

not-affected

focal

not-affected

jammy

not-affected

noble

not-affected

oracular

not-affected

plucky

not-affected

Показывать по

Связанные уязвимости

nvd
11 месяцев назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.

CVSS3: 5.3
github
11 месяцев назад

A vulnerability was found in GNOME libgsf up to 1.14.53. It has been classified as critical. This affects the function gsf_base64_encode_simple. The manipulation of the argument size_t leads to heap-based buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 5.3
fstec
11 месяцев назад

Уязвимость функции gsf_base64_encode_simple библиотеки структурированных файлов The GNOME Project libgsf, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность защищаемой информации