Vulnerability Description
A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gimp | Gimp | 3.2.0 |
| Redhat | Enterprise Linux | 7.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2026-2239Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2437675ExploitIssue TrackingThird Party Advisory
- https://gitlab.gnome.org/GNOME/gimp/-/issues/15812ExploitIssue Tracking
FAQ
What is CVE-2026-2239?
CVE-2026-2239 is a vulnerability with a CVSS score of 2.8 (LOW). A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffe...
How severe is CVE-2026-2239?
CVE-2026-2239 has been rated LOW with a CVSS base score of 2.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2239?
Check the references section above for vendor advisories and patch information. Affected products include: Gimp Gimp, Redhat Enterprise Linux.