Impact
An integer overflow vulnerability exists in GIMP's PSP file parser, specifically the read_creator_block() function, where a 32‑bit length value from a PSP file is used without validation for memory allocation. This flaw leads to a heap overflow and out‑of‑bounds write, allowing an attacker to supply a specially crafted PSP image and trigger an application‑level denial of service. A remote attacker could exploit this by delivering a malicious PSP file that causes GIMP to crash, leading to application downtime.
Affected Systems
The vulnerability affects GIMP installations bundled with Red Hat Enterprise Linux 6 through 9. All users running these RHEL versions with the affected GIMP package are impacted.
Risk and Exploitability
The CVSS v3.10 score is 3.3, indicating a low severity, with an EPSS of less than 1 percent and no listing in the CISA KEV catalog. Because the flaw requires a crafted PSP file, the primary attack vector is a local or remote attacker who can supply such a file to the targeted GIMP instance. While exploitability is technically possible, the low probability and absence of active exploitation reduce overall risk, though patching is still recommended.
OpenCVE Enrichment
Debian DLA
Debian DSA