CVE-2025-48796

NameCVE-2025-48796
DescriptionA flaw was found in GIMP. The GIMP ani_load_image() function is vulnerable to a stack-based overflow. If a user opens.ANI files, GIMP may be used to store more information than the capacity allows. This flaw allows a malicious ANI file to trigger arbitrary code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gimp (PTS)bullseye2.10.22-4+deb11u2fixed
bullseye (security)2.10.22-4+deb11u1fixed
bookworm, bookworm (security)2.10.34-1+deb12u3fixed
trixie3.0.4-3fixed
forky, sid3.0.4-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gimpsourcebullseye(not affected)
gimpsourcebookworm(not affected)
gimpsource(unstable)3.0.0~RC1-4

Notes

[bookworm] - gimp <not-affected> (Vulnerable code not present)
[bullseye] - gimp <not-affected> (Vulnerable code not present)
https://bugzilla.redhat.com/show_bug.cgi?id=2368559
https://gitlab.gnome.org/GNOME/gimp/-/issues/9257
https://gitlab.gnome.org/GNOME/gimp/-/merge_requests/879
Fixed by: https://gitlab.gnome.org/GNOME/gimp/-/commit/0dc98936a0d9f5a70025f4e9cf321d1118ea500e (GIMP_2_99_16)
Introduced in: https://gitlab.gnome.org/GNOME/gimp/-/commit/aa51b9e19ece8a8c54a513fe33b6d65abcb0fbfb (GIMP_2_99_12)

Search for package or bug name: Reporting problems