| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4483-1 | gimp security update |
Debian DSA |
DSA-6139-1 | gimp security update |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Thu, 26 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 26 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in GIMP's PSP (Paint Shop Pro) file parser. A remote attacker could exploit an integer overflow vulnerability in the read_creator_block() function by providing a specially crafted PSP image file. This vulnerability occurs when a 32-bit length value from the file is used for memory allocation without proper validation, leading to a heap overflow and an out-of-bounds write. Successful exploitation could result in an application level denial of service. |
| Title | gimp: GIMP: Denial of service via crafted PSP image file | Gimp: gimp: denial of service via crafted psp image file |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
|
Thu, 12 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gimp
Gimp gimp |
|
| Vendors & Products |
Gimp
Gimp gimp |
Wed, 11 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | gimp: GIMP: Denial of service via crafted PSP image file | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-26T21:09:05.364Z
Reserved: 2026-02-10T09:32:16.763Z
Link: CVE-2026-2271
No data.
Status : Received
Published: 2026-03-26T21:17:04.713
Modified: 2026-03-26T22:16:28.917
Link: CVE-2026-2271
OpenCVE Enrichment
Updated: 2026-02-12T11:19:49Z
Debian DLA
Debian DSA