Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-4152 (GCVE-0-2026-4152)
Vulnerability from cvelistv5 – Published: 2026-04-11 00:15 – Updated: 2026-04-14 03:55- CWE-122 - Heap-based Buffer Overflow
| URL | Tags |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-… | x_research-advisory |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c… | vendor-advisory |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-4152",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-13T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-14T03:55:52.703Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "GIMP",
"vendor": "GIMP",
"versions": [
{
"status": "affected",
"version": "3.0.8"
}
]
}
],
"dateAssigned": "2026-03-13T20:32:46.604Z",
"datePublic": "2026-03-19T20:51:47.302Z",
"descriptions": [
{
"lang": "en",
"value": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122: Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-11T00:15:54.200Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-26-219",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-219/"
},
{
"name": "vendor-provided URL",
"tags": [
"vendor-advisory"
],
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2026-4152",
"datePublished": "2026-04-11T00:15:54.200Z",
"dateReserved": "2026-03-13T20:32:46.564Z",
"dateUpdated": "2026-04-14T03:55:52.703Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-4152",
"date": "2026-05-21",
"epss": "0.00037",
"percentile": "0.10993"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-4152\",\"sourceIdentifier\":\"zdi-disclosures@trendmicro.com\",\"published\":\"2026-04-11T01:16:16.830\",\"lastModified\":\"2026-04-14T19:32:46.420\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gimp:gimp:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866C0EF-59AE-4AB9-8D0F-7C75CD20F77E\"}]}]}],\"references\":[{\"url\":\"https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-26-219/\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-4152\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-13T17:24:03.547065Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-13T17:24:21.660Z\"}}], \"cna\": {\"title\": \"GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability\", \"source\": {\"lang\": \"en\", \"value\": \"Anonymous\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"GIMP\", \"product\": \"GIMP\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.8\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2026-03-19T20:51:47.302Z\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-26-219/\", \"name\": \"ZDI-26-219\", \"tags\": [\"x_research-advisory\"]}, {\"url\": \"https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e\", \"name\": \"vendor-provided URL\", \"tags\": [\"vendor-advisory\"]}], \"dateAssigned\": \"2026-03-13T20:32:46.604Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"CWE-122: Heap-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"shortName\": \"zdi\", \"dateUpdated\": \"2026-04-11T00:15:54.200Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-4152\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-14T03:55:52.703Z\", \"dateReserved\": \"2026-03-13T20:32:46.564Z\", \"assignerOrgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"datePublished\": \"2026-04-11T00:15:54.200Z\", \"assignerShortName\": \"zdi\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
alsa-2026:16484
Vulnerability from osv_almalinux
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
- gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image (CVE-2026-4887)
- gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow (CVE-2026-4154)
- gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow (CVE-2026-4151)
- gimp: GIMP: Remote Code Execution via malicious JP2 file parsing (CVE-2026-4152)
- GIMP: GIMP: Arbitrary code execution via specially crafted PSD file (CVE-2026-4150)
- gimp: GIMP: Remote Code Execution via PSP file parsing (CVE-2026-4153)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "gimp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:3.0.4-1.el9_7.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "gimp-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:3.0.4-1.el9_7.5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. \n\nSecurity Fix(es): \n\n * gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image (CVE-2026-4887)\n * gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow (CVE-2026-4154)\n * gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow (CVE-2026-4151)\n * gimp: GIMP: Remote Code Execution via malicious JP2 file parsing (CVE-2026-4152)\n * GIMP: GIMP: Arbitrary code execution via specially crafted PSD file (CVE-2026-4150)\n * gimp: GIMP: Remote Code Execution via PSP file parsing (CVE-2026-4153)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:16484",
"modified": "2026-05-14T08:57:13Z",
"published": "2026-05-12T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-4150"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-4151"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-4152"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-4153"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-4154"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-4887"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451669"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2457530"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2457532"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2457533"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2457535"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2457536"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-16484.html"
}
],
"related": [
"CVE-2026-4887",
"CVE-2026-4154",
"CVE-2026-4151",
"CVE-2026-4152",
"CVE-2026-4150",
"CVE-2026-4153"
],
"summary": "Important: gimp security update"
}
FKIE_CVE-2026-4152
Vulnerability from fkie_nvd - Published: 2026-04-11 01:16 - Updated: 2026-04-14 19:32{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gimp:gimp:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0866C0EF-59AE-4AB9-8D0F-7C75CD20F77E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863."
}
],
"id": "CVE-2026-4152",
"lastModified": "2026-04-14T19:32:46.420",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary"
}
]
},
"published": "2026-04-11T01:16:16.830",
"references": [
{
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Patch"
],
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e"
},
{
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-219/"
}
],
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-67QF-QF6P-XGV3
Vulnerability from github – Published: 2026-04-11 03:30 – Updated: 2026-04-11 03:30GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.
{
"affected": [],
"aliases": [
"CVE-2026-4152"
],
"database_specific": {
"cwe_ids": [
"CWE-122",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-11T01:16:16Z",
"severity": "HIGH"
},
"details": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.",
"id": "GHSA-67qf-qf6p-xgv3",
"modified": "2026-04-11T03:30:29Z",
"published": "2026-04-11T03:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4152"
},
{
"type": "WEB",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-219"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
RHSA-2026:16484
Vulnerability from csaf_redhat - Published: 2026-05-12 23:49 - Updated: 2026-05-20 02:44A flaw was found in GIMP. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted PSD (Photoshop Document) file. This flaw is due to an integer overflow during the parsing of PSD files, which can lead to arbitrary code execution, allowing the attacker to run malicious code on the affected system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a specially crafted ANI (Animated Cursor) file or visiting a malicious web page. This issue stems from an integer overflow during the parsing of ANI files, caused by insufficient validation of user-supplied data before memory allocation. Successful exploitation could allow an attacker to execute arbitrary code on the affected system with the privileges of the current user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. A remote attacker could exploit this by tricking a user into opening a specially crafted JP2 (JPEG 2000) file. This flaw is due to a heap-based buffer overflow during JP2 file parsing, which allows for arbitrary code execution. Successful exploitation enables the attacker to execute code in the context of the current process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted PSP (PaintShop Pro) file. This flaw is caused by a heap-based buffer overflow, where the application does not properly validate the length of user-supplied data. Successful exploitation can lead to arbitrary code execution in the context of the current process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a malicious XPM (X PixMap) image file. This can lead to an an integer overflow during file processing, allowing the attacker to execute arbitrary code on the affected system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A remote attacker could exploit this by convincing a user to open a specially crafted PCX image. Successful exploitation could lead to out-of-bounds memory disclosure and a possible application crash, resulting in a Denial of Service (DoS).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64 | — |
Vendor Fix
fix
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:16484 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2451669 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457530 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457532 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457533 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457535 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457536 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2026-4150 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457535 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4150 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4150 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/00af… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4151 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457532 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4151 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4151 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4152 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457533 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4152 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4152 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4153 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457536 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4153 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4153 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4154 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457530 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4154 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4154 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7e… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4887 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2451669 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4887 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4887 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/issues/15960 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gimp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.\n\nSecurity Fix(es):\n\n* gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image (CVE-2026-4887)\n\n* gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow (CVE-2026-4154)\n\n* gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow (CVE-2026-4151)\n\n* gimp: GIMP: Remote Code Execution via malicious JP2 file parsing (CVE-2026-4152)\n\n* GIMP: GIMP: Arbitrary code execution via specially crafted PSD file (CVE-2026-4150)\n\n* gimp: GIMP: Remote Code Execution via PSP file parsing (CVE-2026-4153)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:16484",
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451669"
},
{
"category": "external",
"summary": "2457530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457530"
},
{
"category": "external",
"summary": "2457532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457532"
},
{
"category": "external",
"summary": "2457533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457533"
},
{
"category": "external",
"summary": "2457535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457535"
},
{
"category": "external",
"summary": "2457536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457536"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_16484.json"
}
],
"title": "Red Hat Security Advisory: gimp security update",
"tracking": {
"current_release_date": "2026-05-20T02:44:02+00:00",
"generator": {
"date": "2026-05-20T02:44:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:16484",
"initial_release_date": "2026-05-12T23:49:01+00:00",
"revision_history": [
{
"date": "2026-05-12T23:49:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-12T23:49:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-20T02:44:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.5.x86_64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.5.x86_64",
"product_id": "gimp-2:3.0.4-1.el9_7.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.5?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.5?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.5?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.5?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.5?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.5?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.5.i686",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.i686",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.5?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.5?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.5?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.5?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.5?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.5.src",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.5.src",
"product_id": "gimp-2:3.0.4-1.el9_7.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.5?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.5.aarch64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.5.aarch64",
"product_id": "gimp-2:3.0.4-1.el9_7.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.5?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.5?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.5?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.5?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.5?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.5?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.5.ppc64le",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.5.ppc64le",
"product_id": "gimp-2:3.0.4-1.el9_7.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.5?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.5?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.5?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.5?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.5?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.5?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.5.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.5.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.5.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.5.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.5.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4150",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-11T01:01:16.015939+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457535"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted PSD (Photoshop Document) file. This flaw is due to an integer overflow during the parsing of PSD files, which can lead to arbitrary code execution, allowing the attacker to run malicious code on the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GIMP: GIMP: Arbitrary code execution via specially crafted PSD file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4150"
},
{
"category": "external",
"summary": "RHBZ#2457535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457535"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4150"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-217/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-217/"
}
],
"release_date": "2026-04-11T00:15:36.377000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-12T23:49:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GIMP: GIMP: Arbitrary code execution via specially crafted PSD file"
},
{
"cve": "CVE-2026-4151",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-11T01:01:06.466104+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457532"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a specially crafted ANI (Animated Cursor) file or visiting a malicious web page. This issue stems from an integer overflow during the parsing of ANI files, caused by insufficient validation of user-supplied data before memory allocation. Successful exploitation could allow an attacker to execute arbitrary code on the affected system with the privileges of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This flaw in GIMP allows for remote code execution due to an integer overflow when parsing specially crafted ANI (Animated Cursor) files. Exploitation requires user interaction, specifically opening a malicious ANI file or visiting a malicious web page. Red Hat users are affected if they process untrusted ANI files with GIMP.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4151"
},
{
"category": "external",
"summary": "RHBZ#2457532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457532"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4151",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4151"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-218/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-218/"
}
],
"release_date": "2026-04-11T00:15:45.368000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-12T23:49:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should exercise caution and avoid opening untrusted ANI (Animated Cursor) files or visiting untrusted web pages. This vulnerability relies on user interaction to trigger the flaw, therefore, refraining from interacting with untrusted content will prevent exploitation.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow"
},
{
"cve": "CVE-2026-4152",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-11T01:01:09.813733+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457533"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker could exploit this by tricking a user into opening a specially crafted JP2 (JPEG 2000) file. This flaw is due to a heap-based buffer overflow during JP2 file parsing, which allows for arbitrary code execution. Successful exploitation enables the attacker to execute code in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via malicious JP2 file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. The flaw is a heap-based buffer overflow in the JP2 file parsing component. Exploitation requires user interaction, where a victim must open a specially crafted malicious JP2 file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4152"
},
{
"category": "external",
"summary": "RHBZ#2457533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4152",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4152"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-219/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-219/"
}
],
"release_date": "2026-04-11T00:15:54.200000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-12T23:49:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening JP2 (JPEG 2000) files from untrusted sources in GIMP. If GIMP is not required, consider removing the `gimp` package to eliminate the attack surface. For systems where GIMP is necessary, running the application within a sandboxed environment can limit the potential impact of successful exploitation. Removing this package may affect other applications that depend on GIMP.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via malicious JP2 file parsing"
},
{
"cve": "CVE-2026-4153",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-04-11T01:01:19.205899+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457536"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted PSP (PaintShop Pro) file. This flaw is caused by a heap-based buffer overflow, where the application does not properly validate the length of user-supplied data. Successful exploitation can lead to arbitrary code execution in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via PSP file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. The flaw requires user interaction, as an attacker must entice a user to open a specially crafted PSP (PaintShop Pro) file. Red Hat products are affected if GIMP is installed and used to open untrusted PSP files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4153"
},
{
"category": "external",
"summary": "RHBZ#2457536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4153",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4153"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4153",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4153"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-220/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-220/"
}
],
"release_date": "2026-04-11T00:16:01.848000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-12T23:49:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, users should avoid opening untrusted PSP (PaintShop Pro) files with GIMP. Restricting the sources of PSP files to only trusted origins can reduce the risk of exploitation.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via PSP file parsing"
},
{
"cve": "CVE-2026-4154",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-11T01:00:59.234166+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457530"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a malicious XPM (X PixMap) image file. This can lead to an an integer overflow during file processing, allowing the attacker to execute arbitrary code on the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. Exploitation requires a user to open a specially crafted XPM image file. Red Hat Enterprise Linux systems with GIMP installed are affected if users process untrusted XPM files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4154"
},
{
"category": "external",
"summary": "RHBZ#2457530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457530"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4154"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-221/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-221/"
}
],
"release_date": "2026-04-11T00:16:10.657000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-12T23:49:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening XPM image files from untrusted sources. On systems where GIMP is not required, the `gimp` package can be removed. Removing desktop-related packages may impact graphical environment functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow"
},
{
"acknowledgments": [
{
"names": [
"Meshaal (@unrealmesh)"
]
}
],
"cve": "CVE-2026-4887",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2026-03-26T11:34:22.208209+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A remote attacker could exploit this by convincing a user to open a specially crafted PCX image. Successful exploitation could lead to out-of-bounds memory disclosure and a possible application crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate: This flaw in GIMP\u0027s PCX file loader is due to a heap buffer over-read. Exploitation requires user interaction, specifically opening a specially crafted PCX image file. Red Hat Enterprise Linux systems are affected if GIMP is installed and used to open untrusted PCX files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4887"
},
{
"category": "external",
"summary": "RHBZ#2451669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4887",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4887"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/issues/15960",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/issues/15960"
}
],
"release_date": "2026-03-26T11:35:00.070000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-12T23:49:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:16484"
},
{
"category": "workaround",
"details": "Users should avoid opening untrusted PCX image files with GIMP. If GIMP is not required, consider removing the `gimp` package to eliminate this attack vector.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.5.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image"
}
]
}
RHSA-2026:19362
Vulnerability from csaf_redhat - Published: 2026-05-19 21:48 - Updated: 2026-05-20 02:44A flaw was found in GIMP. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted PSD (Photoshop Document) file. This flaw is due to an integer overflow during the parsing of PSD files, which can lead to arbitrary code execution, allowing the attacker to run malicious code on the affected system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a specially crafted ANI (Animated Cursor) file or visiting a malicious web page. This issue stems from an integer overflow during the parsing of ANI files, caused by insufficient validation of user-supplied data before memory allocation. Successful exploitation could allow an attacker to execute arbitrary code on the affected system with the privileges of the current user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. A remote attacker could exploit this by tricking a user into opening a specially crafted JP2 (JPEG 2000) file. This flaw is due to a heap-based buffer overflow during JP2 file parsing, which allows for arbitrary code execution. Successful exploitation enables the attacker to execute code in the context of the current process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted PSP (PaintShop Pro) file. This flaw is caused by a heap-based buffer overflow, where the application does not properly validate the length of user-supplied data. Successful exploitation can lead to arbitrary code execution in the context of the current process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a malicious XPM (X PixMap) image file. This can lead to an an integer overflow during file processing, allowing the attacker to execute arbitrary code on the affected system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A remote attacker could exploit this by convincing a user to open a specially crafted PCX image. Successful exploitation could lead to out-of-bounds memory disclosure and a possible application crash, resulting in a Denial of Service (DoS).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64 | — |
Vendor Fix
fix
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:19362 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2451669 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457530 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457532 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457533 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457535 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457536 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2026-4150 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457535 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4150 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4150 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/00af… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4151 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457532 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4151 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4151 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4152 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457533 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4152 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4152 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4153 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457536 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4153 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4153 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4154 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2457530 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4154 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4154 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7e… | external |
| https://www.zerodayinitiative.com/advisories/ZDI-… | external |
| https://access.redhat.com/security/cve/CVE-2026-4887 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2451669 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-4887 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-4887 | external |
| https://gitlab.gnome.org/GNOME/gimp/-/issues/15960 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gimp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.\n\nSecurity Fix(es):\n\n* gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image (CVE-2026-4887)\n\n* gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow (CVE-2026-4154)\n\n* gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow (CVE-2026-4151)\n\n* gimp: GIMP: Remote Code Execution via malicious JP2 file parsing (CVE-2026-4152)\n\n* GIMP: GIMP: Arbitrary code execution via specially crafted PSD file (CVE-2026-4150)\n\n* gimp: GIMP: Remote Code Execution via PSP file parsing (CVE-2026-4153)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:19362",
"url": "https://access.redhat.com/errata/RHSA-2026:19362"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451669"
},
{
"category": "external",
"summary": "2457530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457530"
},
{
"category": "external",
"summary": "2457532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457532"
},
{
"category": "external",
"summary": "2457533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457533"
},
{
"category": "external",
"summary": "2457535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457535"
},
{
"category": "external",
"summary": "2457536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457536"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_19362.json"
}
],
"title": "Red Hat Security Advisory: gimp security update",
"tracking": {
"current_release_date": "2026-05-20T02:44:03+00:00",
"generator": {
"date": "2026-05-20T02:44:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:19362",
"initial_release_date": "2026-05-19T21:48:47+00:00",
"revision_history": [
{
"date": "2026-05-19T21:48:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-19T21:48:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-20T02:44:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-4.el9_8.4.x86_64",
"product": {
"name": "gimp-2:3.0.4-4.el9_8.4.x86_64",
"product_id": "gimp-2:3.0.4-4.el9_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-4.el9_8.4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"product": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"product_id": "gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-4.el9_8.4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"product": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"product_id": "gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-4.el9_8.4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product_id": "gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-4.el9_8.4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-4.el9_8.4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-4.el9_8.4?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-4.el9_8.4.i686",
"product": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.i686",
"product_id": "gimp-libs-2:3.0.4-4.el9_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-4.el9_8.4?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"product": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"product_id": "gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-4.el9_8.4?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product_id": "gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-4.el9_8.4?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-4.el9_8.4?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product_id": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-4.el9_8.4?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-4.el9_8.4.src",
"product": {
"name": "gimp-2:3.0.4-4.el9_8.4.src",
"product_id": "gimp-2:3.0.4-4.el9_8.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-4.el9_8.4?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-4.el9_8.4.aarch64",
"product": {
"name": "gimp-2:3.0.4-4.el9_8.4.aarch64",
"product_id": "gimp-2:3.0.4-4.el9_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-4.el9_8.4?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"product": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"product_id": "gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-4.el9_8.4?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"product": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"product_id": "gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-4.el9_8.4?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product_id": "gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-4.el9_8.4?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-4.el9_8.4?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-4.el9_8.4?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-4.el9_8.4.ppc64le",
"product": {
"name": "gimp-2:3.0.4-4.el9_8.4.ppc64le",
"product_id": "gimp-2:3.0.4-4.el9_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-4.el9_8.4?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"product": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"product_id": "gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-4.el9_8.4?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"product": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"product_id": "gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-4.el9_8.4?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product_id": "gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-4.el9_8.4?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-4.el9_8.4?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product_id": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-4.el9_8.4?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-4.el9_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64"
},
"product_reference": "gimp-2:3.0.4-4.el9_8.4.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-4.el9_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le"
},
"product_reference": "gimp-2:3.0.4-4.el9_8.4.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-4.el9_8.4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src"
},
"product_reference": "gimp-2:3.0.4-4.el9_8.4.src",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-4.el9_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64"
},
"product_reference": "gimp-2:3.0.4-4.el9_8.4.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686"
},
"product_reference": "gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le"
},
"product_reference": "gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64"
},
"product_reference": "gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686"
},
"product_reference": "gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le"
},
"product_reference": "gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64"
},
"product_reference": "gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64"
},
"product_reference": "gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686"
},
"product_reference": "gimp-libs-2:3.0.4-4.el9_8.4.i686",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le"
},
"product_reference": "gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-4.el9_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64"
},
"product_reference": "gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4150",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-11T01:01:16.015939+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457535"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted PSD (Photoshop Document) file. This flaw is due to an integer overflow during the parsing of PSD files, which can lead to arbitrary code execution, allowing the attacker to run malicious code on the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GIMP: GIMP: Arbitrary code execution via specially crafted PSD file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4150"
},
{
"category": "external",
"summary": "RHBZ#2457535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457535"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4150"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-217/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-217/"
}
],
"release_date": "2026-04-11T00:15:36.377000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T21:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19362"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GIMP: GIMP: Arbitrary code execution via specially crafted PSD file"
},
{
"cve": "CVE-2026-4151",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-11T01:01:06.466104+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457532"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a specially crafted ANI (Animated Cursor) file or visiting a malicious web page. This issue stems from an integer overflow during the parsing of ANI files, caused by insufficient validation of user-supplied data before memory allocation. Successful exploitation could allow an attacker to execute arbitrary code on the affected system with the privileges of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This flaw in GIMP allows for remote code execution due to an integer overflow when parsing specially crafted ANI (Animated Cursor) files. Exploitation requires user interaction, specifically opening a malicious ANI file or visiting a malicious web page. Red Hat users are affected if they process untrusted ANI files with GIMP.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4151"
},
{
"category": "external",
"summary": "RHBZ#2457532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457532"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4151",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4151"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-218/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-218/"
}
],
"release_date": "2026-04-11T00:15:45.368000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T21:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19362"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should exercise caution and avoid opening untrusted ANI (Animated Cursor) files or visiting untrusted web pages. This vulnerability relies on user interaction to trigger the flaw, therefore, refraining from interacting with untrusted content will prevent exploitation.",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow"
},
{
"cve": "CVE-2026-4152",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-11T01:01:09.813733+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457533"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker could exploit this by tricking a user into opening a specially crafted JP2 (JPEG 2000) file. This flaw is due to a heap-based buffer overflow during JP2 file parsing, which allows for arbitrary code execution. Successful exploitation enables the attacker to execute code in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via malicious JP2 file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. The flaw is a heap-based buffer overflow in the JP2 file parsing component. Exploitation requires user interaction, where a victim must open a specially crafted malicious JP2 file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4152"
},
{
"category": "external",
"summary": "RHBZ#2457533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4152",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4152"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-219/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-219/"
}
],
"release_date": "2026-04-11T00:15:54.200000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T21:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19362"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening JP2 (JPEG 2000) files from untrusted sources in GIMP. If GIMP is not required, consider removing the `gimp` package to eliminate the attack surface. For systems where GIMP is necessary, running the application within a sandboxed environment can limit the potential impact of successful exploitation. Removing this package may affect other applications that depend on GIMP.",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via malicious JP2 file parsing"
},
{
"cve": "CVE-2026-4153",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-04-11T01:01:19.205899+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457536"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted PSP (PaintShop Pro) file. This flaw is caused by a heap-based buffer overflow, where the application does not properly validate the length of user-supplied data. Successful exploitation can lead to arbitrary code execution in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via PSP file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. The flaw requires user interaction, as an attacker must entice a user to open a specially crafted PSP (PaintShop Pro) file. Red Hat products are affected if GIMP is installed and used to open untrusted PSP files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4153"
},
{
"category": "external",
"summary": "RHBZ#2457536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4153",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4153"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4153",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4153"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-220/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-220/"
}
],
"release_date": "2026-04-11T00:16:01.848000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T21:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19362"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, users should avoid opening untrusted PSP (PaintShop Pro) files with GIMP. Restricting the sources of PSP files to only trusted origins can reduce the risk of exploitation.",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via PSP file parsing"
},
{
"cve": "CVE-2026-4154",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-11T01:00:59.234166+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457530"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. Remote attackers can exploit this vulnerability by tricking a user into opening a malicious XPM (X PixMap) image file. This can lead to an an integer overflow during file processing, allowing the attacker to execute arbitrary code on the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. Exploitation requires a user to open a specially crafted XPM image file. Red Hat Enterprise Linux systems with GIMP installed are affected if users process untrusted XPM files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4154"
},
{
"category": "external",
"summary": "RHBZ#2457530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457530"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4154"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-26-221/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-221/"
}
],
"release_date": "2026-04-11T00:16:10.657000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T21:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19362"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening XPM image files from untrusted sources. On systems where GIMP is not required, the `gimp` package can be removed. Removing desktop-related packages may impact graphical environment functionality.",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow"
},
{
"acknowledgments": [
{
"names": [
"Meshaal (@unrealmesh)"
]
}
],
"cve": "CVE-2026-4887",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2026-03-26T11:34:22.208209+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451669"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A remote attacker could exploit this by convincing a user to open a specially crafted PCX image. Successful exploitation could lead to out-of-bounds memory disclosure and a possible application crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate: This flaw in GIMP\u0027s PCX file loader is due to a heap buffer over-read. Exploitation requires user interaction, specifically opening a specially crafted PCX image file. Red Hat Enterprise Linux systems are affected if GIMP is installed and used to open untrusted PCX files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4887"
},
{
"category": "external",
"summary": "RHBZ#2451669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4887",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4887"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/issues/15960",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/issues/15960"
}
],
"release_date": "2026-03-26T11:35:00.070000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T21:48:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19362"
},
{
"category": "workaround",
"details": "Users should avoid opening untrusted PCX image files with GIMP. If GIMP is not required, consider removing the `gimp` package to eliminate this attack vector.",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.src",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-debugsource-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-devel-tools-debuginfo-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-2:3.0.4-4.el9_8.4.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.i686",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:gimp-libs-debuginfo-2:3.0.4-4.el9_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.