Upstream information
Description
Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions prior to 28.3.2, 29.3.3, and 30.0.3, the nativeImage.createFromPath() and nativeImage.createFromBuffer() functions call a function downstream that is vulnerable to a heap buffer overflow. An Electron program that uses either of the affected functions is vulnerable to a buffer overflow if an attacker is in control of the image's height, width, and contents. This issue has been patched in versions 28.3.2, 29.3.3, and 30.0.3. There are no workarounds for this issue.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
SUSE | |
---|---|
Base Score | 7 |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | High |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
CVSSv3 Version | 3.1 |
CNA (GitHub) | SUSE | |
---|---|---|
Base Score | 4.4 | 4.4 |
Vector | CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X | CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Attack Vector | Local | Local |
Attack Complexity | High | High |
Attack Requirements | None | None |
Privileges Required | Low | Low |
User Interaction | None | None |
Vulnerable System Confidentiality Impact | High | High |
Vulnerable System Integrity Impact | High | High |
Vulnerable System Availability Impact | High | High |
Subsequent System Confidentiality Impact | None | None |
Subsequent System Integrity Impact | None | None |
Subsequent System Availability Impact | None | None |
CVSSv4 Version | 4.0 | 4.0 |
SUSE Timeline for this CVE
CVE page created: Tue Jul 1 06:00:27 2025CVE page last modified: Mon Jul 7 12:33:31 2025