Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-14425 (GCVE-0-2025-14425)
Vulnerability from cvelistv5 – Published: 2025-12-23 21:31 – Updated: 2026-01-02 14:04
VLAI?
EPSS
Title
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Summary
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.
Severity ?
7.8 (High)
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14425",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-02T14:03:55.275509Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-02T14:04:01.866Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "GIMP",
"vendor": "GIMP",
"versions": [
{
"status": "affected",
"version": "3.0.6"
}
]
}
],
"dateAssigned": "2025-12-10T01:42:24.647Z",
"datePublic": "2025-12-17T20:21:45.285Z",
"descriptions": [
{
"lang": "en",
"value": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122: Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-23T21:31:42.424Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-25-1139",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"
},
{
"name": "vendor-provided URL",
"tags": [
"vendor-advisory"
],
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2025-14425",
"datePublished": "2025-12-23T21:31:42.424Z",
"dateReserved": "2025-12-10T01:42:24.624Z",
"dateUpdated": "2026-01-02T14:04:01.866Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-14425\",\"sourceIdentifier\":\"zdi-disclosures@trendmicro.com\",\"published\":\"2025-12-23T22:15:49.673\",\"lastModified\":\"2026-01-20T17:35:36.010\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gimp:gimp:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B29A73-05E5-438E-B994-61FBB133B6AC\"}]}]}],\"references\":[{\"url\":\"https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-25-1139/\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-14425\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-02T14:03:55.275509Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-02T14:03:58.652Z\"}}], \"cna\": {\"title\": \"GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability\", \"source\": {\"lang\": \"en\", \"value\": \"Anonymous\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"GIMP\", \"product\": \"GIMP\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.6\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2025-12-17T20:21:45.285Z\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-25-1139/\", \"name\": \"ZDI-25-1139\", \"tags\": [\"x_research-advisory\"]}, {\"url\": \"https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd\", \"name\": \"vendor-provided URL\", \"tags\": [\"vendor-advisory\"]}], \"dateAssigned\": \"2025-12-10T01:42:24.647Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"CWE-122: Heap-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"shortName\": \"zdi\", \"dateUpdated\": \"2025-12-23T21:31:42.424Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-14425\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-02T14:04:01.866Z\", \"dateReserved\": \"2025-12-10T01:42:24.624Z\", \"assignerOrgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"datePublished\": \"2025-12-23T21:31:42.424Z\", \"assignerShortName\": \"zdi\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-14425
Vulnerability from fkie_nvd - Published: 2025-12-23 22:15 - Updated: 2026-01-20 17:35
Severity ?
Summary
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gimp:gimp:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B29A73-05E5-438E-B994-61FBB133B6AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248."
}
],
"id": "CVE-2025-14425",
"lastModified": "2026-01-20T17:35:36.010",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary"
}
]
},
"published": "2025-12-23T22:15:49.673",
"references": [
{
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Patch"
],
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
},
{
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"
}
],
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary"
}
]
}
WID-SEC-W-2025-2871
Vulnerability from csaf_certbund - Published: 2025-12-17 23:00 - Updated: 2026-01-21 23:00Summary
GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das "Gnu Image Manipulation Program" ist eine Open Source Software zum Bearbeiten von Bildern. Es ist auch Bestandteil vieler Linux Distributionen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in GIMP ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das \"Gnu Image Manipulation Program\" ist eine Open Source Software zum Bearbeiten von Bildern. Es ist auch Bestandteil vieler Linux Distributionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in GIMP ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2871 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2871.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2871 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2871"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1136 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1137 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1138 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/"
},
{
"category": "external",
"summary": "GNOME GitLab Gimp Commit vom 2025-12-17",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
},
{
"category": "external",
"summary": "Zero Day Initiative ZDI-25-1139 vom 2025-12-17",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4431 vom 2026-01-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00001.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6093 vom 2026-01-05",
"url": "https://security-tracker.debian.org/tracker/DSA-6093-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0914 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0914 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0914.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2GIMP-2026-010 vom 2026-01-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS2GIMP-2026-010.html"
}
],
"source_lang": "en-US",
"title": "GIMP: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2026-01-21T23:00:00.000+00:00",
"generator": {
"date": "2026-01-22T08:54:14.713+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2871",
"initial_release_date": "2025-12-17T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-204980, EUVD-2025-204981, EUVD-2025-204982, EUVD-2025-204983"
},
{
"date": "2026-01-04T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux und Amazon aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source GIMP",
"product": {
"name": "Open Source GIMP",
"product_id": "T049498",
"product_identification_helper": {
"cpe": "cpe:/a:gimp:gimp:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"product_status": {
"known_affected": [
"2951",
"67646",
"T049498",
"398363",
"T004914"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14422"
},
{
"cve": "CVE-2025-14423",
"product_status": {
"known_affected": [
"2951",
"67646",
"T049498",
"398363",
"T004914"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14423"
},
{
"cve": "CVE-2025-14424",
"product_status": {
"known_affected": [
"2951",
"67646",
"T049498",
"398363",
"T004914"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14424"
},
{
"cve": "CVE-2025-14425",
"product_status": {
"known_affected": [
"2951",
"67646",
"T049498",
"398363",
"T004914"
]
},
"release_date": "2025-12-17T23:00:00.000+00:00",
"title": "CVE-2025-14425"
}
]
}
GHSA-849V-267V-772M
Vulnerability from github – Published: 2025-12-24 00:30 – Updated: 2025-12-24 00:30
VLAI?
Details
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2025-14425"
],
"database_specific": {
"cwe_ids": [
"CWE-122"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-23T22:15:49Z",
"severity": "HIGH"
},
"details": "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.",
"id": "GHSA-849v-267v-772m",
"modified": "2025-12-24T00:30:15Z",
"published": "2025-12-24T00:30:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14425"
},
{
"type": "WEB",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
RHSA-2026:0914
Vulnerability from csaf_redhat - Published: 2026-01-21 07:41 - Updated: 2026-01-21 09:50Summary
Red Hat Security Advisory: gimp security update
Notes
Topic
An update for gimp is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422)
* gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425)
* gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424)
* gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gimp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.\n\nSecurity Fix(es):\n\n* gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422)\n\n* gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425)\n\n* gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424)\n\n* gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0914",
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2424766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424766"
},
{
"category": "external",
"summary": "2424767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424767"
},
{
"category": "external",
"summary": "2424774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424774"
},
{
"category": "external",
"summary": "2424782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424782"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0914.json"
}
],
"title": "Red Hat Security Advisory: gimp security update",
"tracking": {
"current_release_date": "2026-01-21T09:50:33+00:00",
"generator": {
"date": "2026-01-21T09:50:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2026:0914",
"initial_release_date": "2026-01-21T07:41:14+00:00",
"revision_history": [
{
"date": "2026-01-21T07:41:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-21T07:41:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T09:50:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.src",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.src",
"product_id": "gimp-2:3.0.4-1.el9_7.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debugsource@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-devel-tools-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_id": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gimp-libs-debuginfo@3.0.4-1.el9_7.2?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
},
"product_reference": "gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14422",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-23T22:05:16.337123+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424766"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability during the parsing of a malicious PNM (Portable Anymap) image file. This issue stems from insufficient validation of user-supplied data, which can lead to an integer overflow before memory allocation. Successful exploitation requires user interaction, such as opening a specially crafted file, and could result in arbitrary code execution within the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows remote code execution in GIMP through an integer overflow when parsing a malicious PNM image file. Exploitation requires user interaction, specifically opening a specially crafted PNM file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14422"
},
{
"category": "external",
"summary": "RHBZ#2424766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14422"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14422",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14422"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1136/"
}
],
"release_date": "2025-12-23T21:31:13.262000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users should exercise caution when opening untrusted PNM image files.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow"
},
{
"cve": "CVE-2025-14423",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-12-23T22:06:28.134746+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424782"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This stack-based buffer overflow vulnerability occurs during the parsing of LBM files due to insufficient validation of user-supplied data length. A remote attacker can exploit this by tricking a user into opening a specially crafted malicious LBM file. Successful exploitation could lead to arbitrary code execution in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows for remote code execution in GIMP. Exploitation requires user interaction, specifically tricking a user into opening a specially crafted malicious LBM file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14423"
},
{
"category": "external",
"summary": "RHBZ#2424782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424782"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14423"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14423",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14423"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/481cdbbb97746be1145ec3a633c567a68633c521"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1137/"
}
],
"release_date": "2025-12-23T21:31:23.374000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, users should avoid opening untrusted LBM files with GIMP. If GIMP is not essential for system operation, consider removing the `gimp` package to eliminate the attack surface. This can be done using the system\u0027s package manager. For example, on Red Hat Enterprise Linux, use `sudo yum remove gimp` or `sudo dnf remove gimp`.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing"
},
{
"cve": "CVE-2025-14424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-12-23T22:05:48.590687+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424774"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This use-after-free vulnerability in the XCF file parsing component allows a remote attacker to execute arbitrary code. Successful exploitation requires user interaction, where a target must open a specially crafted malicious XCF file. This can lead to the execution of unauthorized code in the context of the current process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows for remote code execution in GIMP. Exploitation requires user interaction, specifically opening a specially crafted malicious XCF file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14424"
},
{
"category": "external",
"summary": "RHBZ#2424774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14424"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/5cc55d078b7fba995cef77d195fac325ee288ddd"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1138/"
}
],
"release_date": "2025-12-23T21:31:33.530000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted XCF files with GIMP. If GIMP is not required, consider removing the `gimp` package from the system. This can be done using the package manager specific to your Red Hat distribution. For example, on Red Hat Enterprise Linux, you can use `sudo yum remove gimp` or `sudo dnf remove gimp`.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free"
},
{
"cve": "CVE-2025-14425",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-12-23T22:05:20.441123+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2424767"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GIMP. This heap-based buffer overflow vulnerability in the JP2 file parsing component allows a remote attacker to execute arbitrary code. Exploitation requires user interaction, where the target must open a specially crafted malicious JP2 file. Successful exploitation can lead to complete control over the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as it allows remote code execution via a heap-based buffer overflow in GIMP\u0027s JP2 file parsing component. Exploitation requires user interaction, where a user must open a specially crafted malicious JP2 file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14425"
},
{
"category": "external",
"summary": "RHBZ#2424767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd",
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"
}
],
"release_date": "2025-12-23T21:31:42.424000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T07:41:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0914"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should exercise caution and avoid opening untrusted JP2 image files with GIMP. Restricting the source of JP2 files to trusted origins can reduce the risk of exploitation.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.src",
"AppStream-9.7.0.Z.MAIN:gimp-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-debugsource-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-devel-tools-debuginfo-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-2:3.0.4-1.el9_7.2.x86_64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.aarch64",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.i686",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.ppc64le",
"AppStream-9.7.0.Z.MAIN:gimp-libs-debuginfo-2:3.0.4-1.el9_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…