CVE-2026-40915 PUBLISHED

Gimp: gimp: heap buffer overflow due to integer overflow in fits image loader

Assigner: redhat
Reserved: 15.04.2026 Published: 15.04.2026 Updated: 15.04.2026

A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the FITS image loader by providing a specially crafted FITS file. This integer overflow leads to a zero-byte memory allocation, which is then subjected to a heap buffer overflow when processing pixel data. Successful exploitation could result in a denial of service (DoS) or potentially arbitrary code execution.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS Score: 5.5

Product Status

Vendor Red Hat
Product Red Hat Enterprise Linux 6
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 7
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 8
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 9
Versions Default: affected

Workarounds

Users should avoid opening untrusted FITS image files with GIMP. If GIMP is not required, consider removing the gimp package to eliminate the attack surface. This can be done using the system's package manager, for example: sudo dnf remove gimp. Removing GIMP may impact other applications that depend on it.

Credits

  • Red Hat would like to thank Mehtab Zafar for reporting this issue.

References

Problem Types

  • Integer Overflow or Wraparound CWE