CVE-2025-59820

NameCVE-2025-59820
DescriptionIn KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4395-1, DSA-6065-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
krita (PTS)bullseye1:4.4.2+dfsg-1vulnerable
bullseye (security)1:4.4.2+dfsg-1+deb11u1fixed
bookworm1:5.1.5+dfsg-2vulnerable
bookworm (security)1:5.1.5+dfsg-2+deb12u1fixed
trixie1:5.2.9+dfsg-1vulnerable
trixie (security)1:5.2.9+dfsg-1+deb13u1fixed
forky1:5.2.13+dfsg-2fixed
sid1:5.2.14+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kritasourcebullseye1:4.4.2+dfsg-1+deb11u1DLA-4395-1
kritasourcebookworm1:5.1.5+dfsg-2+deb12u1DSA-6065-1
kritasourcetrixie1:5.2.9+dfsg-1+deb13u1DSA-6065-1
kritasource(unstable)1:5.2.13+dfsg-1

Notes

https://kde.org/info/security/advisory-20250929-1.txt
Fixed by: https://commits.kde.org/krita/6d3651ac4df88efb68e013d21061de9846e83fe8 (v5.2.13)

Search for package or bug name: Reporting problems