{"id":"RLSA-2026:4173","summary":"Important: gimp security update","details":"The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.\n\nSecurity Fix(es):\n\n* gimp: GIMP: Remote code execution via heap-based buffer overflow in ICNS file parsing (CVE-2026-2047)\n\n* gimp: GIMP: Remote Code Execution via uninitialized memory in PGM file parsing (CVE-2026-2044)\n\n* gimp: GIMP: Remote Code Execution via out-of-bounds write in XWD file parsing (CVE-2026-2045)\n\n* gimp: GIMP: Remote Code Execution via ICO File Parsing Vulnerability (CVE-2026-0797)\n\n* gimp: GIMP: Remote Code Execution via XWD file parsing vulnerability (CVE-2026-2048)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-03-23T04:52:40.408727Z","published":"2026-03-11T12:05:01.163508Z","upstream":["CVE-2026-0797","CVE-2026-2044","CVE-2026-2045","CVE-2026-2047","CVE-2026-2048"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2026:4173"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2441517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2441521"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2441522"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2441524"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2441527"}],"affected":[{"package":{"name":"gimp","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/gimp?distro=rocky-linux-9&epoch=2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:3.0.4-1.el9_7.4"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2026:4173.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}