Description
A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.
Published: 2026-03-26
Score: 2.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: Application-level Denial of Service
Action: Monitor
AI Analysis

Impact

A heap‑buffer‑overflow in GIMP’s fread_pascal_string function can be triggered by a specially crafted PSD file. The overflow results in an out‑of‑bounds read during the computation of a Pascal string’s length, causing the application to crash. The primary impact is an application‑level Denial of Service with no privilege escalation or data disclosure.

Affected Systems

The vulnerability affects GIMP 3.2.0‑rc3 and runs on Red Hat Enterprise Linux 7, 8, and 9. Users of these operating systems who have that version of GIMP installed are susceptible.

Risk and Exploitability

With a CVSS score of 2.8 the severity is low, and an EPSS score of less than 1% indicates a very low likelihood of exploitation. The issue is not listed in the CISA KEV catalog. Based on the description, it is inferred that exploitation requires a user to open a malicious PSD file in GIMP, implying a local or user‑initiated attack vector with no remote or network‑level risk.

Generated by OpenCVE AI on April 15, 2026 at 22:37 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


OpenCVE Recommended Actions

  • Upgrade GIMP to the latest stable release that fixes the buffer overflow bug.
  • Restrict or disable PSD file loading in GIMP if the feature is not required.
  • Monitor the system for crashes and apply vendor security updates for GIMP and RHEL as soon as they become available.

Generated by OpenCVE AI on April 15, 2026 at 22:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4483-1 gimp security update
Debian DSA Debian DSA DSA-6139-1 gimp security update
History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gimp:gimp:3.2.0:rc3:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Mon, 30 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
References

Thu, 26 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.
Title gimp: GIMP: Application crash (DoS) via crafted PSD file due to heap-buffer-overflow Gimp: gimp: application crash (dos) via crafted psd file due to heap-buffer-overflow
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References

Tue, 10 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Gimp
Gimp gimp
Vendors & Products Gimp
Gimp gimp

Mon, 09 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title gimp: GIMP: Application crash (DoS) via crafted PSD file due to heap-buffer-overflow
Weaknesses CWE-170
References
Metrics threat_severity

None

cvssV3_1

{'score': 2.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}

threat_severity

Low


Subscriptions

Gimp Gimp
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-03T20:25:04.014Z

Reserved: 2026-02-09T09:07:05.426Z

Link: CVE-2026-2239

cve-icon Vulnrichment

Updated: 2026-03-30T11:29:16.114Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T21:17:04.483

Modified: 2026-04-03T20:12:51.977

Link: CVE-2026-2239

cve-icon Redhat

Severity : Low

Publid Date: 2026-02-09T07:07:00Z

Links: CVE-2026-2239 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:45:16Z

Weaknesses