A flaw was found in GIMP when processing certain TGA image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing a heap buffer overflow.
Workaround:
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:9162 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9165 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9308 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9309 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9310 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9314 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9315 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9316 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9501 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9569 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-48797 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2368558 | issue tracking |