
CVE-2025-2724 – GNOME libgsf sorting_key_copy out-of-bounds
https://notcve.org/view.php?id=CVE-2025-2724
25 Mar 2025 — A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way. • https://vuldb.com/?ctiid.300744 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVE-2025-2723 – GNOME libgsf gsf_property_settings_collec heap-based overflow
https://notcve.org/view.php?id=CVE-2025-2723
25 Mar 2025 — A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. • https://vuldb.com/?ctiid.300743 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVE-2025-2722 – GNOME libgsf gsf_prop_settings_collect_va heap-based overflow
https://notcve.org/view.php?id=CVE-2025-2722
25 Mar 2025 — A vulnerability was found in GNOME libgsf up to 1.14.53. It has been declared as critical. This vulnerability affects the function gsf_prop_settings_collect_va. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Local access is required to approach this attack. • https://vuldb.com/?ctiid.300742 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVE-2025-2721 – GNOME libgsf gsf_base64_encode_simple heap-based overflow
https://notcve.org/view.php?id=CVE-2025-2721
25 Mar 2025 — A vulnerability was found in GNOME libgsf up to 1.14.53. It has been classified as critical. This affects the function gsf_base64_encode_simple. The manipulation of the argument size_t leads to heap-based buffer overflow. An attack has to be approached locally. • https://vuldb.com/?ctiid.300741 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVE-2024-42415 – Debian Security Advisory 5786-1
https://notcve.org/view.php?id=CVE-2024-42415
03 Oct 2024 — An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. Integer overflows flaws were discovered in the Compound Document Binary File format par... • https://gitlab.gnome.org/GNOME/libgsf/-/issues/34 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-36474 – Ubuntu Security Notice USN-7062-1
https://notcve.org/view.php?id=CVE-2024-36474
03 Oct 2024 — An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. USN-7062-1 fixed vulnerabilities in libg... • https://gitlab.gnome.org/GNOME/libgsf/-/issues/34 • CWE-190: Integer Overflow or Wraparound •