OESA-2026-1714

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1714
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1714.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1714
Upstream
  • CVE-2026-4152
Published
2026-03-27T14:03:23Z
Modified
2026-03-27T14:15:33.023361Z
Summary
gimp security update
Details

The GIMP is an image composition and editing program, which can be used for creating logos and other graphics for Web pages. The GIMP offers many tools and filters, and provides a large image manipulation toolbox, including channel operations and layers, effects, subpixel imaging and antialiasing, and conversions, together with multilevel undo. The GIMP offers a scripting facility, but many of the included scripts rely on fonts that we cannot distribute.

Security Fix(es):

GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PGM files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28158.(CVE-2026-2044)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28265.(CVE-2026-2045)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28591.(CVE-2026-2048)

(CVE-2026-4152)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / gimp

Package

Name
gimp
Purl
pkg:rpm/openEuler/gimp&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.6-20.oe2003sp4

Ecosystem specific

{
    "aarch64": [
        "gimp-2.10.6-20.oe2003sp4.aarch64.rpm",
        "gimp-debuginfo-2.10.6-20.oe2003sp4.aarch64.rpm",
        "gimp-debugsource-2.10.6-20.oe2003sp4.aarch64.rpm",
        "gimp-devel-2.10.6-20.oe2003sp4.aarch64.rpm",
        "gimp-help-2.10.6-20.oe2003sp4.aarch64.rpm",
        "gimp-libs-2.10.6-20.oe2003sp4.aarch64.rpm"
    ],
    "src": [
        "gimp-2.10.6-20.oe2003sp4.src.rpm"
    ],
    "x86_64": [
        "gimp-2.10.6-20.oe2003sp4.x86_64.rpm",
        "gimp-debuginfo-2.10.6-20.oe2003sp4.x86_64.rpm",
        "gimp-debugsource-2.10.6-20.oe2003sp4.x86_64.rpm",
        "gimp-devel-2.10.6-20.oe2003sp4.x86_64.rpm",
        "gimp-help-2.10.6-20.oe2003sp4.x86_64.rpm",
        "gimp-libs-2.10.6-20.oe2003sp4.x86_64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1714.json"