RHSA-2026:0914
Vulnerability from csaf_redhat - Published: 2026-01-21 07:41 - Updated: 2026-01-21 09:50Summary
Red Hat Security Advisory: gimp security update
Notes
Topic
An update for gimp is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422)
* gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425)
* gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424)
* gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gimp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.\n\nSecurity Fix(es):\n\n* gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422)\n\n* gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425)\n\n* gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424)\n\n* gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0914",
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2424766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424766"
},
{
"category": "external",
"summary": "2424767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424767"
},
{
"category": "external",
"summary": "2424774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424774"
},
{
"category": "external",
"summary": "2424782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424782"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0914.json"
}
],
"title": "Red Hat Security Advisory: gimp security update",
"tracking": {
"current_release_date": "2026-01-21T09:50:33+00:00",
"generator": {
"date": "2026-01-21T09:50:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2026:0914",
"initial_release_date": "2026-01-21T07:41:14+00:00",
"revision_history": [
{
"date": "2026-01-21T07:41:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-21T07:41:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T09:50:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.src",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.src",
"product_id": "gimp-2:3.0.4-1.el9_7.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-23T22:05:16.337123+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424766"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability during the parsing of a malicious PNM (Portable Anymap) image file. This issue stems from insufficient validation of user-supplied data, which can lead to an integer overflow before memory allocation. Successful exploitation requires user interaction, such as opening a specially crafted file, and could result in arbitrary code execution within the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows remote code execution in GIMP through an integer overflow when parsing a malicious PNM image file. Exploitation requires user interaction, specifically opening a specially crafted PNM file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14422"
},
{
"category": "external",
"summary": "RHBZ#2424766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14422"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14422",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14422"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/"
}
],
"release_date": "2025-12-23T21:31:13.262000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users should exercise caution when opening untrusted PNM image files.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow"
},
{
"cve": "CVE-2025-14423",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-12-23T22:06:28.134746+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424782"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This stack-based buffer overflow vulnerability occurs during the parsing of LBM files due to insufficient validation of user-supplied data length. A remote attacker can exploit this by tricking a user into opening a specially crafted malicious LBM file. Successful exploitation could lead to arbitrary code execution in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows for remote code execution in GIMP. Exploitation requires user interaction, specifically tricking a user into opening a specially crafted malicious LBM file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14423"
},
{
"category": "external",
"summary": "RHBZ#2424782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424782"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14423"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14423",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14423"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/"
}
],
"release_date": "2025-12-23T21:31:23.374000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, users should avoid opening untrusted LBM files with GIMP. If GIMP is not essential for system operation, consider removing the `gimp` package to eliminate the attack surface. This can be done using the system\u0027s package manager. For example, on Red Hat Enterprise Linux, use `sudo yum remove gimp` or `sudo dnf remove gimp`.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing"
},
{
"cve": "CVE-2025-14424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-12-23T22:05:48.590687+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424774"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This use-after-free vulnerability in the XCF file parsing component allows a remote attacker to execute arbitrary code. Successful exploitation requires user interaction, where a target must open a specially crafted malicious XCF file. This can lead to the execution of unauthorized code in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows for remote code execution in GIMP. Exploitation requires user interaction, specifically opening a specially crafted malicious XCF file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14424"
},
{
"category": "external",
"summary": "RHBZ#2424774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14424"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/"
}
],
"release_date": "2025-12-23T21:31:33.530000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted XCF files with GIMP. If GIMP is not required, consider removing the `gimp` package from the system. This can be done using the package manager specific to your Red Hat distribution. For example, on Red Hat Enterprise Linux, you can use `sudo yum remove gimp` or `sudo dnf remove gimp`.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free"
},
{
"cve": "CVE-2025-14425",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-23T22:05:20.441123+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424767"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This heap-based buffer overflow vulnerability in the JP2 file parsing component allows a remote attacker to execute arbitrary code. Exploitation requires user interaction, where the target must open a specially crafted malicious JP2 file. Successful exploitation can lead to complete control over the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as it allows remote code execution via a heap-based buffer overflow in GIMP\u0027s JP2 file parsing component. Exploitation requires user interaction, where a user must open a specially crafted malicious JP2 file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14425"
},
{
"category": "external",
"summary": "RHBZ#2424767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"
}
],
"release_date": "2025-12-23T21:31:42.424000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should exercise caution and avoid opening untrusted JP2 image files with GIMP. Restricting the source of JP2 files to trusted origins can reduce the risk of exploitation.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…