Description
A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `ReadJeffsImage` function allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file. This can lead to a denial of service or potentially arbitrary code execution.
Published: 2026-04-15
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution or denial of service via a buffer overflow in GIMP’s GIF processing
Action: Monitor
AI Analysis

Impact

A buffer overflow flaw exists in the ReadJeffsImage function of GIMP’s GIF loading component. The vulnerability allows an attacker to write beyond the allocated buffer when parsing a specially crafted GIF file, which can lead to application crashes or, in some configurations, arbitrary code execution. The weakness aligns with CWE‑120, indicating improper bounds checking and memory corruption. Because the overflow occurs in a routine that processes user-supplied files, an attacker who can supply a malicious GIF to a system that runs GIMP can potentially destabilize the application or achieve escalation of privileges.

Affected Systems

The flaw affects GIMP installations that are part of Red Hat Enterprise Linux releases 6, 7, 8, and 9. No specific GIMP version numbers are listed in the advisory, so any distribution package containing GIMP on these operating systems is potentially affected. Exact impact may vary depending on whether the vulnerable function is invoked during typical user workflows or server‑side processing.

Risk and Exploitability

The CVSS base score of 7.3 classifies this as a high‑severity vulnerability, while the EPSS score is not available, indicating that we lack current data on exploit prevalence. The vulnerability has not been listed in the CISA Known Exploited Vulnerabilities catalog, suggesting no publicly known weaponized exploits as of now. The likely attack vector is local exploitation via crafted GIF files processed by the GIMP application, but if GIMP or its libraries are used in a shared or networked context, remote execution could be possible. No official workaround exists that meets Red Hat security criteria, so the risk remains until a patch or upgrade is deployed.

Generated by OpenCVE AI on April 15, 2026 at 21:56 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.


OpenCVE Recommended Actions

  • Deploy any Red Hat update that resolves the GIF buffer overflow when it becomes available
  • If a patch is not yet released, disable GIF support in GIMP or remove the GIF plugin package to prevent processing of malicious files
  • Limit user or service accounts from running GIMP with untrusted input and segregate image processing tasks to secure environments
  • Continuously monitor Red Hat security bulletins and CVE feeds for updates on this issue

Generated by OpenCVE AI on April 15, 2026 at 21:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `ReadJeffsImage` function allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file. This can lead to a denial of service or potentially arbitrary code execution.
Title Gimp: gimp: arbitrary code execution or denial of service via buffer overflow in gif image processing
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-120
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-16T03:56:19.004Z

Reserved: 2026-04-15T18:39:13.651Z

Link: CVE-2026-6384

cve-icon Vulnrichment

Updated: 2026-04-15T19:31:29.295Z

cve-icon NVD

Status : Received

Published: 2026-04-15T20:16:44.033

Modified: 2026-04-15T20:16:44.033

Link: CVE-2026-6384

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-15T18:41:34Z

Links: CVE-2026-6384 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:12:15Z

Weaknesses