It was discovered that GIMP incorrectly handled certain images. If a user were tricked into opening a specially crafted image, an attacker could possibly use this to execute arbitrary code. (CVE-2017-17784, CVE-2017-17785, CVE-2017-17786, CVE-2017-17787, CVE-2017-17788, CVE-2017-17789)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "gimp" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "gimp-data" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "gimp-dbg" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "gimp-dbgsym" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "libgimp2.0" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "libgimp2.0-dbgsym" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "libgimp2.0-dev" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "libgimp2.0-dev-dbgsym" }, { "binary_version": "2.8.10-0ubuntu1.2", "binary_name": "libgimp2.0-doc" } ] }