Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-59820

Опубликовано: 26 нояб. 2025
Источник: redhat
CVSS3: 6.7

Описание

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

A flaw was found in Krita. This vulnerability allows a heap-based buffer overflow via loading a manipulated TGA (Truevision Graphics Adapter) file.

Отчет

A heap-based buffer overflow in Krita, triggered by loading a manipulated TGA file, could lead to arbitrary code execution or application instability. This issue primarily affects the integrity and availability of the Krita application when processing untrusted input.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1284
https://bugzilla.redhat.com/show_bug.cgi?id=2417216Krita: Krita: Heap-based buffer overflow via manipulated TGA file

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
4 месяца назад

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

CVSS3: 6.7
nvd
4 месяца назад

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

CVSS3: 6.7
debian
4 месяца назад

In KDE Krita before 5.2.13, loading a manipulated TGA file could resul ...

CVSS3: 6.7
github
4 месяца назад

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

6.7 Medium

CVSS3