vulnerability

Rocky Linux: CVE-2025-48797: gimp-2.8 (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Oct 13, 2025

Description

A flaw was found in GIMP when processing certain TGA image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing a heap buffer overflow.

Solutions

rocky-upgrade-gimprocky-upgrade-gimp-debuginforocky-upgrade-gimp-debugsourcerocky-upgrade-gimp-develrocky-upgrade-gimp-devel-toolsrocky-upgrade-gimp-devel-tools-debuginforocky-upgrade-gimp-libsrocky-upgrade-gimp-libs-debuginforocky-upgrade-pygobject2rocky-upgrade-pygobject2-codegenrocky-upgrade-pygobject2-debuginforocky-upgrade-pygobject2-debugsourcerocky-upgrade-pygobject2-develrocky-upgrade-pygobject2-docrocky-upgrade-pygtk2rocky-upgrade-pygtk2-codegenrocky-upgrade-pygtk2-debuginforocky-upgrade-pygtk2-debugsourcerocky-upgrade-pygtk2-develrocky-upgrade-python2-cairorocky-upgrade-python2-cairo-debuginforocky-upgrade-python2-cairo-develrocky-upgrade-python2-pycairo-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.