CVE-2025-2720

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-2720
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-2720.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-2720
Related
Withdrawn
2025-03-27T13:00:22.051313Z
Published
2025-03-25T00:15:15Z
Modified
2025-03-27T06:49:08.441393Z
Summary
[none]
Details

Rejected reason: * REJECT * DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: According to the code maintainer the call of the POC is invalid because the buffer pointed to by "data" must have "len" valid bytes. The docs were updated to make that clear.

References

Affected packages

Debian:11 / libgsf

Package

Name
libgsf
Purl
pkg:deb/debian/libgsf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.14.47-1
1.14.47-1+deb11u1
1.14.49-1
1.14.50-1
1.14.51-1
1.14.51-2
1.14.52-1
1.14.52-1.1
1.14.53-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libgsf

Package

Name
libgsf
Purl
pkg:deb/debian/libgsf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.14.50-1
1.14.50-1+deb12u1
1.14.51-1
1.14.51-2
1.14.52-1
1.14.52-1.1
1.14.53-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libgsf

Package

Name
libgsf
Purl
pkg:deb/debian/libgsf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.14.50-1
1.14.51-1
1.14.51-2
1.14.52-1
1.14.52-1.1
1.14.53-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}