It was discovered that GIMP incorrectly handled certain images. If a user were tricked into opening a specially crafted image, an attacker could possibly use this to execute arbitrary code. (CVE-2017-17784, CVE-2017-17785, CVE-2017-17786, CVE-2017-17787, CVE-2017-17788, CVE-2017-17789)
{ "availability": "No subscription required", "binaries": [ { "binary_name": "gimp", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "gimp-data", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "gimp-dbg", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "gimp-dbgsym", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "libgimp2.0", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "libgimp2.0-dbgsym", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "libgimp2.0-dev", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "libgimp2.0-dev-dbgsym", "binary_version": "2.8.10-0ubuntu1.2" }, { "binary_name": "libgimp2.0-doc", "binary_version": "2.8.10-0ubuntu1.2" } ] }