Bug#1107758: gimp: CVE-2025-2760
Salvatore Bonaccorso
carnil at debian.org
Fri Jun 13 20:19:24 BST 2025
Source: gimp
Version: 3.0.4-2
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://gitlab.gnome.org/GNOME/gimp/-/issues/12790
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Control: found -1 2.10.34-1+deb12u2
Control: found -1 2.10.34-1+deb12u3
Control: found -1 2.10.34-1
Control: found -1 3.0.2-3.1
Hi,
The following vulnerability was published for gimp.
CVE-2025-2760[0]:
| GIMP XWD File Parsing Integer Overflow Remote Code Execution
| Vulnerability. This vulnerability allows remote attackers to execute
| arbitrary code on affected installations of GIMP. User interaction
| is required to exploit this vulnerability in that the target must
| visit a malicious page or open a malicious file. The specific flaw
| exists within the parsing of XWD files. The issue results from the
| lack of proper validation of user-supplied data, which can result in
| an integer overflow before allocating a buffer. An attacker can
| leverage this vulnerability to execute code in the context of the
| current process. Was ZDI-CAN-25082.
Please note that the original fix was incomplete, cf. [2].
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-2760
https://www.cve.org/CVERecord?id=CVE-2025-2760
[1] https://gitlab.gnome.org/GNOME/gimp/-/issues/12790
[2] https://gitlab.gnome.org/GNOME/gimp/-/issues/12790#note_2468776
[3] https://gitlab.gnome.org/GNOME/gimp/-/merge_requests/2323
[4] https://www.zerodayinitiative.com/advisories/ZDI-25-203/
Regards,
Salvatore
More information about the pkg-gnome-maintainers
mailing list