Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-14424 (GCVE-0-2025-14424)
Vulnerability from cvelistv5 – Published: 2025-12-23 21:31 – Updated: 2026-02-26 16:07
VLAI?
EPSS
Title
GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability
Summary
GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
Severity ?
7.8 (High)
CWE
- CWE-416 - Use After Free
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14424",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-01T04:55:24.634619Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:24.147Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "GIMP",
"vendor": "GIMP",
"versions": [
{
"status": "affected",
"version": "3.0.6"
}
]
}
],
"dateAssigned": "2025-12-10T01:42:20.404Z",
"datePublic": "2025-12-17T20:21:30.568Z",
"descriptions": [
{
"lang": "en",
"value": "GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416: Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-23T21:31:33.530Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-25-1138",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/"
},
{
"name": "vendor-provided URL",
"tags": [
"vendor-advisory"
],
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2025-14424",
"datePublished": "2025-12-23T21:31:33.530Z",
"dateReserved": "2025-12-10T01:42:20.383Z",
"dateUpdated": "2026-02-26T16:07:24.147Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-14424\",\"sourceIdentifier\":\"zdi-disclosures@trendmicro.com\",\"published\":\"2025-12-23T22:15:49.543\",\"lastModified\":\"2026-01-20T17:21:49.567\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gimp:gimp:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B29A73-05E5-438E-B994-61FBB133B6AC\"}]}]}],\"references\":[{\"url\":\"https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-25-1138/\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-14424\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-01T04:55:24.634619Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-07T17:04:43.023Z\"}}], \"cna\": {\"title\": \"GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability\", \"source\": {\"lang\": \"en\", \"value\": \"Anonymous\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"GIMP\", \"product\": \"GIMP\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.6\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2025-12-17T20:21:30.568Z\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-25-1138/\", \"name\": \"ZDI-25-1138\", \"tags\": [\"x_research-advisory\"]}, {\"url\": \"https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd\", \"name\": \"vendor-provided URL\", \"tags\": [\"vendor-advisory\"]}], \"dateAssigned\": \"2025-12-10T01:42:20.404Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416: Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"shortName\": \"zdi\", \"dateUpdated\": \"2025-12-23T21:31:33.530Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-14424\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-07T17:09:47.229Z\", \"dateReserved\": \"2025-12-10T01:42:20.383Z\", \"assignerOrgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"datePublished\": \"2025-12-23T21:31:33.530Z\", \"assignerShortName\": \"zdi\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:0914
Vulnerability from csaf_redhat - Published: 2026-01-21 07:41 - Updated: 2026-01-29 21:07Summary
Red Hat Security Advisory: gimp security update
Notes
Topic
An update for gimp is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422)
* gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425)
* gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424)
* gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gimp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.\n\nSecurity Fix(es):\n\n* gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422)\n\n* gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425)\n\n* gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424)\n\n* gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0914",
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2424766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424766"
},
{
"category": "external",
"summary": "2424767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424767"
},
{
"category": "external",
"summary": "2424774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424774"
},
{
"category": "external",
"summary": "2424782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424782"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0914.json"
}
],
"title": "Red Hat Security Advisory: gimp security update",
"tracking": {
"current_release_date": "2026-01-29T21:07:52+00:00",
"generator": {
"date": "2026-01-29T21:07:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2026:0914",
"initial_release_date": "2026-01-21T07:41:14+00:00",
"revision_history": [
{
"date": "2026-01-21T07:41:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-21T07:41:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-29T21:07:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.src",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.src",
"product_id": "gimp-2:3.0.4-1.el9_7.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-23T22:05:16.337123+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424766"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability during the parsing of a malicious PNM (Portable Anymap) image file. This issue stems from insufficient validation of user-supplied data, which can lead to an integer overflow before memory allocation. Successful exploitation requires user interaction, such as opening a specially crafted file, and could result in arbitrary code execution within the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows remote code execution in GIMP through an integer overflow when parsing a malicious PNM image file. Exploitation requires user interaction, specifically opening a specially crafted PNM file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14422"
},
{
"category": "external",
"summary": "RHBZ#2424766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14422"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14422",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14422"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/"
}
],
"release_date": "2025-12-23T21:31:13.262000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users should exercise caution when opening untrusted PNM image files.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow"
},
{
"cve": "CVE-2025-14423",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-12-23T22:06:28.134746+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424782"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This stack-based buffer overflow vulnerability occurs during the parsing of LBM files due to insufficient validation of user-supplied data length. A remote attacker can exploit this by tricking a user into opening a specially crafted malicious LBM file. Successful exploitation could lead to arbitrary code execution in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows for remote code execution in GIMP. Exploitation requires user interaction, specifically tricking a user into opening a specially crafted malicious LBM file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14423"
},
{
"category": "external",
"summary": "RHBZ#2424782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424782"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14423"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14423",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14423"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/"
}
],
"release_date": "2025-12-23T21:31:23.374000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, users should avoid opening untrusted LBM files with GIMP. If GIMP is not essential for system operation, consider removing the `gimp` package to eliminate the attack surface. This can be done using the system\u0027s package manager. For example, on Red Hat Enterprise Linux, use `sudo yum remove gimp` or `sudo dnf remove gimp`.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing"
},
{
"cve": "CVE-2025-14424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-12-23T22:05:48.590687+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424774"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This use-after-free vulnerability in the XCF file parsing component allows a remote attacker to execute arbitrary code. Successful exploitation requires user interaction, where a target must open a specially crafted malicious XCF file. This can lead to the execution of unauthorized code in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows for remote code execution in GIMP. Exploitation requires user interaction, specifically opening a specially crafted malicious XCF file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14424"
},
{
"category": "external",
"summary": "RHBZ#2424774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14424"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/"
}
],
"release_date": "2025-12-23T21:31:33.530000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted XCF files with GIMP. If GIMP is not required, consider removing the `gimp` package from the system. This can be done using the package manager specific to your Red Hat distribution. For example, on Red Hat Enterprise Linux, you can use `sudo yum remove gimp` or `sudo dnf remove gimp`.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free"
},
{
"cve": "CVE-2025-14425",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-23T22:05:20.441123+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424767"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This heap-based buffer overflow vulnerability in the JP2 file parsing component allows a remote attacker to execute arbitrary code. Exploitation requires user interaction, where the target must open a specially crafted malicious JP2 file. Successful exploitation can lead to complete control over the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as it allows remote code execution via a heap-based buffer overflow in GIMP\u0027s JP2 file parsing component. Exploitation requires user interaction, where a user must open a specially crafted malicious JP2 file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14425"
},
{
"category": "external",
"summary": "RHBZ#2424767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"
}
],
"release_date": "2025-12-23T21:31:42.424000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should exercise caution and avoid opening untrusted JP2 image files with GIMP. Restricting the source of JP2 files to trusted origins can reduce the risk of exploitation.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow"
}
]
}
OPENSUSE-SU-2026:10066-1
Vulnerability from csaf_opensuse - Published: 2026-01-19 00:00 - Updated: 2026-01-19 00:00Summary
gimp-3.0.6-5.1 on GA media
Notes
Title of the patch
gimp-3.0.6-5.1 on GA media
Description of the patch
These are all security issues fixed in the gimp-3.0.6-5.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2026-10066
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gimp-3.0.6-5.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gimp-3.0.6-5.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10066",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10066-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14422 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14423 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14424 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14425 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14425/"
}
],
"title": "gimp-3.0.6-5.1 on GA media",
"tracking": {
"current_release_date": "2026-01-19T00:00:00Z",
"generator": {
"date": "2026-01-19T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10066-1",
"initial_release_date": "2026-01-19T00:00:00Z",
"revision_history": [
{
"date": "2026-01-19T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.6-5.1.aarch64",
"product": {
"name": "gimp-3.0.6-5.1.aarch64",
"product_id": "gimp-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.6-5.1.aarch64",
"product": {
"name": "gimp-devel-3.0.6-5.1.aarch64",
"product_id": "gimp-devel-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"product": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"product_id": "gimp-extension-goat-excercises-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-lang-3.0.6-5.1.aarch64",
"product": {
"name": "gimp-lang-3.0.6-5.1.aarch64",
"product_id": "gimp-lang-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.6-5.1.aarch64",
"product": {
"name": "gimp-plugin-aa-3.0.6-5.1.aarch64",
"product_id": "gimp-plugin-aa-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.6-5.1.aarch64",
"product": {
"name": "gimp-plugin-python3-3.0.6-5.1.aarch64",
"product_id": "gimp-plugin-python3-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.6-5.1.aarch64",
"product": {
"name": "gimp-vala-3.0.6-5.1.aarch64",
"product_id": "gimp-vala-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.6-5.1.aarch64",
"product": {
"name": "libgimp-3_0-0-3.0.6-5.1.aarch64",
"product_id": "libgimp-3_0-0-3.0.6-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.6-5.1.aarch64",
"product": {
"name": "libgimpui-3_0-0-3.0.6-5.1.aarch64",
"product_id": "libgimpui-3_0-0-3.0.6-5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.6-5.1.ppc64le",
"product": {
"name": "gimp-3.0.6-5.1.ppc64le",
"product_id": "gimp-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.6-5.1.ppc64le",
"product": {
"name": "gimp-devel-3.0.6-5.1.ppc64le",
"product_id": "gimp-devel-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"product": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"product_id": "gimp-extension-goat-excercises-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-lang-3.0.6-5.1.ppc64le",
"product": {
"name": "gimp-lang-3.0.6-5.1.ppc64le",
"product_id": "gimp-lang-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.6-5.1.ppc64le",
"product": {
"name": "gimp-plugin-aa-3.0.6-5.1.ppc64le",
"product_id": "gimp-plugin-aa-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.6-5.1.ppc64le",
"product": {
"name": "gimp-plugin-python3-3.0.6-5.1.ppc64le",
"product_id": "gimp-plugin-python3-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.6-5.1.ppc64le",
"product": {
"name": "gimp-vala-3.0.6-5.1.ppc64le",
"product_id": "gimp-vala-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.6-5.1.ppc64le",
"product": {
"name": "libgimp-3_0-0-3.0.6-5.1.ppc64le",
"product_id": "libgimp-3_0-0-3.0.6-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"product": {
"name": "libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"product_id": "libgimpui-3_0-0-3.0.6-5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.6-5.1.s390x",
"product": {
"name": "gimp-3.0.6-5.1.s390x",
"product_id": "gimp-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.6-5.1.s390x",
"product": {
"name": "gimp-devel-3.0.6-5.1.s390x",
"product_id": "gimp-devel-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"product": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"product_id": "gimp-extension-goat-excercises-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "gimp-lang-3.0.6-5.1.s390x",
"product": {
"name": "gimp-lang-3.0.6-5.1.s390x",
"product_id": "gimp-lang-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.6-5.1.s390x",
"product": {
"name": "gimp-plugin-aa-3.0.6-5.1.s390x",
"product_id": "gimp-plugin-aa-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.6-5.1.s390x",
"product": {
"name": "gimp-plugin-python3-3.0.6-5.1.s390x",
"product_id": "gimp-plugin-python3-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.6-5.1.s390x",
"product": {
"name": "gimp-vala-3.0.6-5.1.s390x",
"product_id": "gimp-vala-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.6-5.1.s390x",
"product": {
"name": "libgimp-3_0-0-3.0.6-5.1.s390x",
"product_id": "libgimp-3_0-0-3.0.6-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.6-5.1.s390x",
"product": {
"name": "libgimpui-3_0-0-3.0.6-5.1.s390x",
"product_id": "libgimpui-3_0-0-3.0.6-5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.6-5.1.x86_64",
"product": {
"name": "gimp-3.0.6-5.1.x86_64",
"product_id": "gimp-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.6-5.1.x86_64",
"product": {
"name": "gimp-devel-3.0.6-5.1.x86_64",
"product_id": "gimp-devel-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"product": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"product_id": "gimp-extension-goat-excercises-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-lang-3.0.6-5.1.x86_64",
"product": {
"name": "gimp-lang-3.0.6-5.1.x86_64",
"product_id": "gimp-lang-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.6-5.1.x86_64",
"product": {
"name": "gimp-plugin-aa-3.0.6-5.1.x86_64",
"product_id": "gimp-plugin-aa-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.6-5.1.x86_64",
"product": {
"name": "gimp-plugin-python3-3.0.6-5.1.x86_64",
"product_id": "gimp-plugin-python3-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.6-5.1.x86_64",
"product": {
"name": "gimp-vala-3.0.6-5.1.x86_64",
"product_id": "gimp-vala-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.6-5.1.x86_64",
"product": {
"name": "libgimp-3_0-0-3.0.6-5.1.x86_64",
"product_id": "libgimp-3_0-0-3.0.6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.6-5.1.x86_64",
"product": {
"name": "libgimpui-3_0-0-3.0.6-5.1.x86_64",
"product_id": "libgimpui-3_0-0-3.0.6-5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64"
},
"product_reference": "gimp-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le"
},
"product_reference": "gimp-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x"
},
"product_reference": "gimp-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64"
},
"product_reference": "gimp-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64"
},
"product_reference": "gimp-devel-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le"
},
"product_reference": "gimp-devel-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x"
},
"product_reference": "gimp-devel-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64"
},
"product_reference": "gimp-devel-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64"
},
"product_reference": "gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le"
},
"product_reference": "gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x"
},
"product_reference": "gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64"
},
"product_reference": "gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-lang-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64"
},
"product_reference": "gimp-lang-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-lang-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le"
},
"product_reference": "gimp-lang-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-lang-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x"
},
"product_reference": "gimp-lang-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-lang-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64"
},
"product_reference": "gimp-lang-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64"
},
"product_reference": "gimp-plugin-aa-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le"
},
"product_reference": "gimp-plugin-aa-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x"
},
"product_reference": "gimp-plugin-aa-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64"
},
"product_reference": "gimp-plugin-aa-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64"
},
"product_reference": "gimp-plugin-python3-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le"
},
"product_reference": "gimp-plugin-python3-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x"
},
"product_reference": "gimp-plugin-python3-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64"
},
"product_reference": "gimp-plugin-python3-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64"
},
"product_reference": "gimp-vala-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le"
},
"product_reference": "gimp-vala-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x"
},
"product_reference": "gimp-vala-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64"
},
"product_reference": "gimp-vala-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64"
},
"product_reference": "libgimp-3_0-0-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le"
},
"product_reference": "libgimp-3_0-0-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x"
},
"product_reference": "libgimp-3_0-0-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64"
},
"product_reference": "libgimp-3_0-0-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.6-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64"
},
"product_reference": "libgimpui-3_0-0-3.0.6-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.6-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le"
},
"product_reference": "libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.6-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x"
},
"product_reference": "libgimpui-3_0-0-3.0.6-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.6-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
},
"product_reference": "libgimpui-3_0-0-3.0.6-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14422"
}
],
"notes": [
{
"category": "general",
"text": "GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14422",
"url": "https://www.suse.com/security/cve/CVE-2025-14422"
},
{
"category": "external",
"summary": "SUSE Bug 1255293 for CVE-2025-14422",
"url": "https://bugzilla.suse.com/1255293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-19T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-14422"
},
{
"cve": "CVE-2025-14423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14423"
}
],
"notes": [
{
"category": "general",
"text": "GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14423",
"url": "https://www.suse.com/security/cve/CVE-2025-14423"
},
{
"category": "external",
"summary": "SUSE Bug 1255294 for CVE-2025-14423",
"url": "https://bugzilla.suse.com/1255294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-19T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-14423"
},
{
"cve": "CVE-2025-14424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14424"
}
],
"notes": [
{
"category": "general",
"text": "GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14424",
"url": "https://www.suse.com/security/cve/CVE-2025-14424"
},
{
"category": "external",
"summary": "SUSE Bug 1255295 for CVE-2025-14424",
"url": "https://bugzilla.suse.com/1255295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-19T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-14424"
},
{
"cve": "CVE-2025-14425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14425"
}
],
"notes": [
{
"category": "general",
"text": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14425",
"url": "https://www.suse.com/security/cve/CVE-2025-14425"
},
{
"category": "external",
"summary": "SUSE Bug 1255296 for CVE-2025-14425",
"url": "https://bugzilla.suse.com/1255296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gimp-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-devel-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-extension-goat-excercises-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-lang-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-aa-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-plugin-python3-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:gimp-vala-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimp-3_0-0-3.0.6-5.1.x86_64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.aarch64",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.ppc64le",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.s390x",
"openSUSE Tumbleweed:libgimpui-3_0-0-3.0.6-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-19T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-14425"
}
]
}
OPENSUSE-RU-2026:20168-1
Vulnerability from csaf_opensuse - Published: 2026-02-03 18:05 - Updated: 2026-02-03 18:05Summary
Recommended update for gimp
Notes
Title of the patch
Recommended update for gimp
Description of the patch
This update for gimp fixes the following issues:
Changes in gimp:
- Update to 3.0.8
- Font Loading Performance
- Improvements in start-up time for users with a large number
of fonts was backported from our 3.2 RC2 release. As a
result, we now wait to load images until fonts are
initialized - this prevents some occasional odd displays and
other issues when an XCF file tried to access a partially
loaded font.
- Assorted updates and fixes
- Daniel Plakhotich helped us identify an issue when exporting
a lossless WEBP image could be affected by lossy settings
(such as Quality being less than 100%). We’ve updated our
WEBP plug-in to prevent this from happening.
- Thanks to Jehan‘s efforts, the standard gimp-3.0 executable
can now be run with a --no-interface flag instead of
requiring users to call gimp-console-3.0 even on devices with
no display. The --show-debug-menu flag is now visible as
well.
- programmer_ceds improved our flatpak by adding safe guards to
show the correct configuration directory regardless of
whether XDG_CONFIG_HOME is defined on the user’s system. This
should make it much easier for flatpak users to install and
use third party plug-ins.
- We fixed a rare but possible crash when using the Equalize
filter on images with NaN values. Images that contain these
are usually created from scientific or mapping data, so
you’re unlikely to come across them in standard editing.
- Jeremy Bicha fixed an internal issue where the wrong version
number could be used when installing minor releases (such as
the 3.2 release candidates and upcoming 3.2 stable release).
- As noted in our 3.2RC2 news post, we have updated our SVG
import code to improve the rendered path.
- Further improvements have been made to our non-destructive
filter code to improve stability, especially when copying and
pasting layers and images with filters attached to them. Some
issues related to applying NDE filters on Quick Masks have
also been corrected.
- An unintended Search pop-up that appeared when typing while
the Channels dockable was selected has been turned off.
- When saving XCFs for GIMP 2.10 compatibility, we
unintentionally saved Grid color using the new color format.
This caused errors when reopening the XCF in 2.10. This
problem has now been fixed! If you encounter any other XCF
incompatibility, please let us know.
- Themes and UX
- The Navigation and Selection Editor dockables no longer show
a large bright texture when no image is actively selected.
This was especially noticeable on dark themes.
- When a layer has no active filters, the Fx column had the
same “checkbox” outline when hovered over as the lock column.
This led to confusion about clicking it to add filters. We
have removed the outline on hover as a small step to help
address this.
- Ondřej Míchal fixed alignment and cut-off issues with the
buttons on our Transform tool overlays. All buttons should
now be properly centered and visible.
- The options for filling layers with colors when resizing the
canvas will be turned off when not relevant (such as when you
set layers to not be resized).
- More GUI elements such as dialog header icons will now
respond to your icon size preferences.
- Ondřej Míchal has continued his work to update our UI with
the more usable Spin Scale widget. He has also updated the
widget itself to improve how it works for users and
developers alike.
- Security fixes
- Jacob Boerema and Gabriele Barbero continued to patch
potential security issues related to some of our file format
plug-ins. In addition to existing fixes mentioned in the
release candidate news posts, the following exploits are now
prevented: ZDI-CAN-28232 ZDI-CAN-28265 ZDI-CAN-28530
ZDI-CAN-28591 ZDI-CAN-28599
- Another potential issue related to ICO files with incorrect
metadata was reported by Dhiraj. It does not have a CVE
number yet, but it has been fixed for GIMP 3.0.8. Jacob
Boerema also fixed a potential issue with loading Creator
blocks in Paintshop Pro PSP images.
- API
- For plug-in and script developers, a few new public APIs were
backported to GIMP 3.0.8. gimp_cairo_surface_get_buffer ()
allows you to retrieve a GEGL buffer from a Cairo surface
(such as a text layer). Note that this deprecates
gimp_cairo_surface_create_buffer ().
- gimp_config_set_xcf_version () and
gimp_config_get_xcf_version () can be used to specify a
particular XCF version for a configuration. This will allow
you to have that data serialized/deserialized for certain
versions of GIMP if there were differences (such as the Grid
colors mentioned above).
- Fixes were made for retrieving image metadata via scripting.
GimpMetadata is now a visible child of GExiv2Metadata, so you
can use standard gexiv2 functions to retrieve information
from it.
- Original thumbnail metadata is also now removed on export to
prevent potential issues when exporting into a new format.
Patchnames
openSUSE-Leap-16.0-packagehub-106
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for gimp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gimp fixes the following issues:\n\nChanges in gimp:\n\n- Update to 3.0.8\n - Font Loading Performance\n - Improvements in start-up time for users with a large number\n of fonts was backported from our 3.2 RC2 release. As a\n result, we now wait to load images until fonts are\n initialized - this prevents some occasional odd displays and\n other issues when an XCF file tried to access a partially\n loaded font.\n - Assorted updates and fixes\n - Daniel Plakhotich helped us identify an issue when exporting\n a lossless WEBP image could be affected by lossy settings\n (such as Quality being less than 100%). We\u2019ve updated our\n WEBP plug-in to prevent this from happening.\n - Thanks to Jehan\u2018s efforts, the standard gimp-3.0 executable\n can now be run with a --no-interface flag instead of\n requiring users to call gimp-console-3.0 even on devices with\n no display. The --show-debug-menu flag is now visible as\n well.\n - programmer_ceds improved our flatpak by adding safe guards to\n show the correct configuration directory regardless of\n whether XDG_CONFIG_HOME is defined on the user\u2019s system. This\n should make it much easier for flatpak users to install and\n use third party plug-ins.\n - We fixed a rare but possible crash when using the Equalize\n filter on images with NaN values. Images that contain these\n are usually created from scientific or mapping data, so\n you\u2019re unlikely to come across them in standard editing.\n - Jeremy Bicha fixed an internal issue where the wrong version\n number could be used when installing minor releases (such as\n the 3.2 release candidates and upcoming 3.2 stable release).\n - As noted in our 3.2RC2 news post, we have updated our SVG\n import code to improve the rendered path.\n - Further improvements have been made to our non-destructive\n filter code to improve stability, especially when copying and\n pasting layers and images with filters attached to them. Some\n issues related to applying NDE filters on Quick Masks have\n also been corrected.\n - An unintended Search pop-up that appeared when typing while\n the Channels dockable was selected has been turned off.\n - When saving XCFs for GIMP 2.10 compatibility, we\n unintentionally saved Grid color using the new color format.\n This caused errors when reopening the XCF in 2.10. This\n problem has now been fixed! If you encounter any other XCF\n incompatibility, please let us know.\n - Themes and UX\n - The Navigation and Selection Editor dockables no longer show\n a large bright texture when no image is actively selected.\n This was especially noticeable on dark themes.\n - When a layer has no active filters, the Fx column had the\n same \u201ccheckbox\u201d outline when hovered over as the lock column.\n This led to confusion about clicking it to add filters. We\n have removed the outline on hover as a small step to help\n address this.\n - Ond\u0159ej M\u00edchal fixed alignment and cut-off issues with the\n buttons on our Transform tool overlays. All buttons should\n now be properly centered and visible.\n - The options for filling layers with colors when resizing the\n canvas will be turned off when not relevant (such as when you\n set layers to not be resized).\n - More GUI elements such as dialog header icons will now\n respond to your icon size preferences.\n - Ond\u0159ej M\u00edchal has continued his work to update our UI with\n the more usable Spin Scale widget. He has also updated the\n widget itself to improve how it works for users and\n developers alike.\n - Security fixes\n - Jacob Boerema and Gabriele Barbero continued to patch\n potential security issues related to some of our file format\n plug-ins. In addition to existing fixes mentioned in the\n release candidate news posts, the following exploits are now\n prevented: ZDI-CAN-28232 ZDI-CAN-28265 ZDI-CAN-28530\n ZDI-CAN-28591 ZDI-CAN-28599\n - Another potential issue related to ICO files with incorrect\n metadata was reported by Dhiraj. It does not have a CVE\n number yet, but it has been fixed for GIMP 3.0.8. Jacob\n Boerema also fixed a potential issue with loading Creator\n blocks in Paintshop Pro PSP images.\n - API\n - For plug-in and script developers, a few new public APIs were\n backported to GIMP 3.0.8. gimp_cairo_surface_get_buffer ()\n allows you to retrieve a GEGL buffer from a Cairo surface\n (such as a text layer). Note that this deprecates\n gimp_cairo_surface_create_buffer ().\n - gimp_config_set_xcf_version () and\n gimp_config_get_xcf_version () can be used to specify a\n particular XCF version for a configuration. This will allow\n you to have that data serialized/deserialized for certain\n versions of GIMP if there were differences (such as the Grid\n colors mentioned above).\n - Fixes were made for retrieving image metadata via scripting.\n GimpMetadata is now a visible child of GExiv2Metadata, so you\n can use standard gexiv2 functions to retrieve information\n from it.\n - Original thumbnail metadata is also now removed on export to\n prevent potential issues when exporting into a new format.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-packagehub-106",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-ru-2026_20168-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1255293",
"url": "https://bugzilla.suse.com/1255293"
},
{
"category": "self",
"summary": "SUSE Bug 1255294",
"url": "https://bugzilla.suse.com/1255294"
},
{
"category": "self",
"summary": "SUSE Bug 1255295",
"url": "https://bugzilla.suse.com/1255295"
},
{
"category": "self",
"summary": "SUSE Bug 1255296",
"url": "https://bugzilla.suse.com/1255296"
},
{
"category": "self",
"summary": "SUSE Bug 1255766",
"url": "https://bugzilla.suse.com/1255766"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14422 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14423 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14424 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14425 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15059/"
}
],
"title": "Recommended update for gimp",
"tracking": {
"current_release_date": "2026-02-03T18:05:40Z",
"generator": {
"date": "2026-02-03T18:05:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-RU-2026:20168-1",
"initial_release_date": "2026-02-03T18:05:40Z",
"revision_history": [
{
"date": "2026-02-03T18:05:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "gimp-3.0.8-bp160.1.1.aarch64",
"product_id": "gimp-3.0.8-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "gimp-devel-3.0.8-bp160.1.1.aarch64",
"product_id": "gimp-devel-3.0.8-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"product_id": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"product_id": "gimp-plugin-aa-3.0.8-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"product_id": "gimp-plugin-python3-3.0.8-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "gimp-vala-3.0.8-bp160.1.1.aarch64",
"product_id": "gimp-vala-3.0.8-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"product_id": "libgimp-3_0-0-3.0.8-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"product": {
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"product_id": "libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-lang-3.0.8-bp160.1.1.noarch",
"product": {
"name": "gimp-lang-3.0.8-bp160.1.1.noarch",
"product_id": "gimp-lang-3.0.8-bp160.1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "gimp-3.0.8-bp160.1.1.ppc64le",
"product_id": "gimp-3.0.8-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "gimp-devel-3.0.8-bp160.1.1.ppc64le",
"product_id": "gimp-devel-3.0.8-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"product_id": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"product_id": "gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"product_id": "gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "gimp-vala-3.0.8-bp160.1.1.ppc64le",
"product_id": "gimp-vala-3.0.8-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"product_id": "libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"product": {
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"product_id": "libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "gimp-3.0.8-bp160.1.1.x86_64",
"product_id": "gimp-3.0.8-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "gimp-devel-3.0.8-bp160.1.1.x86_64",
"product_id": "gimp-devel-3.0.8-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"product_id": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"product_id": "gimp-plugin-aa-3.0.8-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"product_id": "gimp-plugin-python3-3.0.8-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "gimp-vala-3.0.8-bp160.1.1.x86_64",
"product_id": "gimp-vala-3.0.8-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"product_id": "libgimp-3_0-0-3.0.8-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64",
"product": {
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64",
"product_id": "libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "gimp-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "gimp-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "gimp-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "gimp-devel-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "gimp-devel-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "gimp-devel-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-lang-3.0.8-bp160.1.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch"
},
"product_reference": "gimp-lang-3.0.8-bp160.1.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "gimp-vala-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "gimp-vala-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "gimp-vala-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64"
},
"product_reference": "libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le"
},
"product_reference": "libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
},
"product_reference": "libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14422"
}
],
"notes": [
{
"category": "general",
"text": "GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14422",
"url": "https://www.suse.com/security/cve/CVE-2025-14422"
},
{
"category": "external",
"summary": "SUSE Bug 1255293 for CVE-2025-14422",
"url": "https://bugzilla.suse.com/1255293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-03T18:05:40Z",
"details": "important"
}
],
"title": "CVE-2025-14422"
},
{
"cve": "CVE-2025-14423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14423"
}
],
"notes": [
{
"category": "general",
"text": "GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14423",
"url": "https://www.suse.com/security/cve/CVE-2025-14423"
},
{
"category": "external",
"summary": "SUSE Bug 1255294 for CVE-2025-14423",
"url": "https://bugzilla.suse.com/1255294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-03T18:05:40Z",
"details": "important"
}
],
"title": "CVE-2025-14423"
},
{
"cve": "CVE-2025-14424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14424"
}
],
"notes": [
{
"category": "general",
"text": "GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14424",
"url": "https://www.suse.com/security/cve/CVE-2025-14424"
},
{
"category": "external",
"summary": "SUSE Bug 1255295 for CVE-2025-14424",
"url": "https://bugzilla.suse.com/1255295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-03T18:05:40Z",
"details": "important"
}
],
"title": "CVE-2025-14424"
},
{
"cve": "CVE-2025-14425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14425"
}
],
"notes": [
{
"category": "general",
"text": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14425",
"url": "https://www.suse.com/security/cve/CVE-2025-14425"
},
{
"category": "external",
"summary": "SUSE Bug 1255296 for CVE-2025-14425",
"url": "https://bugzilla.suse.com/1255296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-03T18:05:40Z",
"details": "important"
}
],
"title": "CVE-2025-14425"
},
{
"cve": "CVE-2025-15059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15059"
}
],
"notes": [
{
"category": "general",
"text": "GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28232.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15059",
"url": "https://www.suse.com/security/cve/CVE-2025-15059"
},
{
"category": "external",
"summary": "SUSE Bug 1255766 for CVE-2025-15059",
"url": "https://bugzilla.suse.com/1255766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.8-bp160.1.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.8-bp160.1.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.8-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-03T18:05:40Z",
"details": "important"
}
],
"title": "CVE-2025-15059"
}
]
}
OPENSUSE-SU-2026:20100-1
Vulnerability from csaf_opensuse - Published: 2026-01-21 13:31 - Updated: 2026-01-21 13:31Summary
Security update for gimp
Notes
Title of the patch
Security update for gimp
Description of the patch
This update for gimp fixes the following issues:
Changes in gimp:
- CVE-2025-14422: Fixed PNM File Parsing Integer Overflow (bsc#1255293)
- CVE-2025-14423: Fixed LBM File Parsing Stack-based Buffer Overflow (bsc#1255294)
- CVE-2025-14424: Fixed XCF File Parsing Use-After-Free (bsc#1255295)
- CVE-2025-14425: Fixed JP2 File Parsing Heap-based Buffer Overflow(bsc#1255296)
Patchnames
openSUSE-Leap-16.0-packagehub-88
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gimp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gimp fixes the following issues:\n\nChanges in gimp:\n\n- CVE-2025-14422: Fixed PNM File Parsing Integer Overflow (bsc#1255293)\n- CVE-2025-14423: Fixed LBM File Parsing Stack-based Buffer Overflow (bsc#1255294)\n- CVE-2025-14424: Fixed XCF File Parsing Use-After-Free (bsc#1255295)\n- CVE-2025-14425: Fixed JP2 File Parsing Heap-based Buffer Overflow(bsc#1255296)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-packagehub-88",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20100-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1255293",
"url": "https://bugzilla.suse.com/1255293"
},
{
"category": "self",
"summary": "SUSE Bug 1255294",
"url": "https://bugzilla.suse.com/1255294"
},
{
"category": "self",
"summary": "SUSE Bug 1255295",
"url": "https://bugzilla.suse.com/1255295"
},
{
"category": "self",
"summary": "SUSE Bug 1255296",
"url": "https://bugzilla.suse.com/1255296"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14422 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14423 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14424 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14425 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14425/"
}
],
"title": "Security update for gimp",
"tracking": {
"current_release_date": "2026-01-21T13:31:29Z",
"generator": {
"date": "2026-01-21T13:31:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20100-1",
"initial_release_date": "2026-01-21T13:31:29Z",
"revision_history": [
{
"date": "2026-01-21T13:31:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "gimp-3.0.6-bp160.2.1.aarch64",
"product_id": "gimp-3.0.6-bp160.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "gimp-devel-3.0.6-bp160.2.1.aarch64",
"product_id": "gimp-devel-3.0.6-bp160.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"product_id": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"product_id": "gimp-plugin-aa-3.0.6-bp160.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"product_id": "gimp-plugin-python3-3.0.6-bp160.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "gimp-vala-3.0.6-bp160.2.1.aarch64",
"product_id": "gimp-vala-3.0.6-bp160.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"product_id": "libgimp-3_0-0-3.0.6-bp160.2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"product": {
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"product_id": "libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-lang-3.0.6-bp160.2.1.noarch",
"product": {
"name": "gimp-lang-3.0.6-bp160.2.1.noarch",
"product_id": "gimp-lang-3.0.6-bp160.2.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "gimp-3.0.6-bp160.2.1.ppc64le",
"product_id": "gimp-3.0.6-bp160.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "gimp-devel-3.0.6-bp160.2.1.ppc64le",
"product_id": "gimp-devel-3.0.6-bp160.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"product_id": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"product_id": "gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"product_id": "gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "gimp-vala-3.0.6-bp160.2.1.ppc64le",
"product_id": "gimp-vala-3.0.6-bp160.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"product_id": "libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"product": {
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"product_id": "libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "gimp-3.0.6-bp160.2.1.x86_64",
"product_id": "gimp-3.0.6-bp160.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-devel-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "gimp-devel-3.0.6-bp160.2.1.x86_64",
"product_id": "gimp-devel-3.0.6-bp160.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"product_id": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"product_id": "gimp-plugin-aa-3.0.6-bp160.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"product_id": "gimp-plugin-python3-3.0.6-bp160.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-vala-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "gimp-vala-3.0.6-bp160.2.1.x86_64",
"product_id": "gimp-vala-3.0.6-bp160.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"product_id": "libgimp-3_0-0-3.0.6-bp160.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64",
"product": {
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64",
"product_id": "libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "gimp-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "gimp-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "gimp-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "gimp-devel-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "gimp-devel-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "gimp-devel-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-lang-3.0.6-bp160.2.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch"
},
"product_reference": "gimp-lang-3.0.6-bp160.2.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-aa-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-plugin-python3-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "gimp-vala-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "gimp-vala-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-vala-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "gimp-vala-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimp-3_0-0-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64"
},
"product_reference": "libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le"
},
"product_reference": "libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
},
"product_reference": "libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14422"
}
],
"notes": [
{
"category": "general",
"text": "GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14422",
"url": "https://www.suse.com/security/cve/CVE-2025-14422"
},
{
"category": "external",
"summary": "SUSE Bug 1255293 for CVE-2025-14422",
"url": "https://bugzilla.suse.com/1255293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T13:31:29Z",
"details": "important"
}
],
"title": "CVE-2025-14422"
},
{
"cve": "CVE-2025-14423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14423"
}
],
"notes": [
{
"category": "general",
"text": "GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14423",
"url": "https://www.suse.com/security/cve/CVE-2025-14423"
},
{
"category": "external",
"summary": "SUSE Bug 1255294 for CVE-2025-14423",
"url": "https://bugzilla.suse.com/1255294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T13:31:29Z",
"details": "important"
}
],
"title": "CVE-2025-14423"
},
{
"cve": "CVE-2025-14424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14424"
}
],
"notes": [
{
"category": "general",
"text": "GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14424",
"url": "https://www.suse.com/security/cve/CVE-2025-14424"
},
{
"category": "external",
"summary": "SUSE Bug 1255295 for CVE-2025-14424",
"url": "https://bugzilla.suse.com/1255295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T13:31:29Z",
"details": "important"
}
],
"title": "CVE-2025-14424"
},
{
"cve": "CVE-2025-14425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14425"
}
],
"notes": [
{
"category": "general",
"text": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14425",
"url": "https://www.suse.com/security/cve/CVE-2025-14425"
},
{
"category": "external",
"summary": "SUSE Bug 1255296 for CVE-2025-14425",
"url": "https://bugzilla.suse.com/1255296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1.noarch",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1.x86_64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.aarch64",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.ppc64le",
"openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T13:31:29Z",
"details": "important"
}
],
"title": "CVE-2025-14425"
}
]
}
FKIE_CVE-2025-14424
Vulnerability from fkie_nvd - Published: 2025-12-23 22:15 - Updated: 2026-01-20 17:21
Severity ?
Summary
GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gimp:gimp:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B29A73-05E5-438E-B994-61FBB133B6AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376."
}
],
"id": "CVE-2025-14424",
"lastModified": "2026-01-20T17:21:49.567",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary"
}
]
},
"published": "2025-12-23T22:15:49.543",
"references": [
{
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Patch"
],
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
},
{
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/"
}
],
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary"
}
]
}
WID-SEC-W-2025-2871
Vulnerability from csaf_certbund - Published: 2025-12-17 23:00 - Updated: 2026-02-23 23:00Summary
GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das "Gnu Image Manipulation Program" ist eine Open Source Software zum Bearbeiten von Bildern. Es ist auch Bestandteil vieler Linux Distributionen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in GIMP ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das \"Gnu Image Manipulation Program\" ist eine Open Source Software zum Bearbeiten von Bildern. Es ist auch Bestandteil vieler Linux Distributionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in GIMP ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2871 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2871.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2871 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2871"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1136 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1137 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1138 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1139 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4431 vom 2026-01-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00001.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6093 vom 2026-01-05",
"url": "https://security-tracker.debian.org/tracker/DSA-6093-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0914 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0914 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0914.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2GIMP-2026-010 vom 2026-01-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS2GIMP-2026-010.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0914 vom 2026-01-22",
"url": "https://errata.build.resf.org/RLSA-2026:0914"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1511 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1511"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0313-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023932.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1574 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1574"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1588 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1588"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1587 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1587"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1574 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2026-1574.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1586 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1586"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1585 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1585"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1584 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1584"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1591 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1591"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1590 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1590"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1589 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1589"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1574 vom 2026-01-31",
"url": "https://errata.build.resf.org/RLSA-2026:1574"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8057-1 vom 2026-02-23",
"url": "https://ubuntu.com/security/notices/USN-8057-1"
}
],
"source_lang": "en-US",
"title": "GIMP: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2026-02-23T23:00:00.000+00:00",
"generator": {
"date": "2026-02-24T08:48:01.611+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2871",
"initial_release_date": "2025-12-17T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-204980, EUVD-2025-204981, EUVD-2025-204982, EUVD-2025-204983"
},
{
"date": "2026-01-04T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux und Amazon aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source GIMP",
"product": {
"name": "Open Source GIMP",
"product_id": "T049498",
"product_identification_helper": {
"cpe": "cpe:/a:gimp:gimp:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T049498",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14422"
},
{
"cve": "CVE-2025-14423",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T049498",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14423"
},
{
"cve": "CVE-2025-14424",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T049498",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14424"
},
{
"cve": "CVE-2025-14425",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T049498",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14425"
}
]
}
GHSA-PJWQ-73JV-FMGX
Vulnerability from github – Published: 2025-12-24 00:30 – Updated: 2025-12-24 00:30
VLAI?
Details
GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2025-14424"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-23T22:15:49Z",
"severity": "HIGH"
},
"details": "GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.",
"id": "GHSA-pjwq-73jv-fmgx",
"modified": "2025-12-24T00:30:15Z",
"published": "2025-12-24T00:30:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14424"
},
{
"type": "WEB",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…