Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3911-1 | libgsf security update |
Debian DSA |
DSA-5786-1 | libgsf security update |
EUVD |
EUVD-2024-39610 | An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Ubuntu USN |
USN-7062-1 | libgsf vulnerabilities |
Ubuntu USN |
USN-7062-2 | libgsf vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 04 Oct 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | libgsf: Compound Document Binary File Sector Allocation Table integer overflow vulnerability | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 03 Oct 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnome
Gnome libgsf |
|
| CPEs | cpe:2.3:a:gnome:libgsf:*:*:*:*:*:*:*:* cpe:2.3:a:gnome:libgsf:1.14.52:*:*:*:*:*:*:* |
|
| Vendors & Products |
Gnome
Gnome libgsf |
|
| Metrics |
ssvc
|
Thu, 03 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-03T22:04:50.389Z
Reserved: 2024-08-23T16:07:08.799Z
Link: CVE-2024-42415
Updated: 2025-11-03T22:04:50.389Z
Status : Modified
Published: 2024-10-03T16:15:05.867
Modified: 2025-11-03T22:18:05.960
Link: CVE-2024-42415
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN