PT-2025-44072 · Krita +1 · Krita +1

Published

2025-01-01

·

Updated

2025-11-29

·

CVE-2025-59820

CVSS v3.1
6.7
VectorAV:L/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N
Name of the Vulnerable Software and Affected Versions Krita versions prior to 5.2.13 Krita versions 5.1.5+dfsg-2+deb12u1 through 5.1.5+dfsg-2+deb12u1 Krita versions 5.2.9+dfsg-1+deb13u1 through 5.2.9+dfsg-1+deb13u1
Description A heap-based buffer overflow exists in the TGA parser of Krita, a creative application for raster images. Loading a manipulated TGA file can lead to a buffer overflow in the
kis tga import.cpp
file (also known as
KisTgaImport
). Specifically, control flow continues even when the number of pixels is negative. This issue could potentially allow for arbitrary code execution if a specially crafted image is opened.
Recommendations Upgrade Krita to version 5.2.13 or later. Upgrade Krita packages to version 1:5.1.5+dfsg-2+deb12u1 for Debian oldstable (bookworm). Upgrade Krita packages to version 1:5.2.9+dfsg-1+deb13u1 for Debian stable (trixie).

Fix

RCE

Weakness Enumeration

Related Identifiers

ALT-PU-2025-12859
CVE-2025-59820
DSA-6065-1
ZDI-25-972

Affected Products

Debian
Krita