2026-03-26 20:0CVE-2026-2239redhat
PUBLISHED5.2CWE-170

Gimp: gimp: application crash (dos) via crafted psd file due to heap-buffer-overflow

A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.

Problem type

Affected products

Red Hat

Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Red Hat Enterprise Linux 9

References

GitHub Security Advisories

GHSA-pjv8-58qr-6mxx

A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string...

https://github.com/advisories/GHSA-pjv8-58qr-6mxx

A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-2239
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-2239",
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "dateUpdated": "2026-03-26T20:00:28.595Z",
    "dateReserved": "2026-02-09T09:07:05.426Z",
    "datePublished": "2026-03-26T20:00:28.595Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat",
        "dateUpdated": "2026-03-26T20:00:28.595Z"
      },
      "datePublic": "2026-02-09T07:07:00.000Z",
      "title": "Gimp: gimp: application crash (dos) via crafted psd file due to heap-buffer-overflow",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service."
        }
      ],
      "affected": [
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 7",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "gimp",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:7"
          ],
          "defaultStatus": "unknown"
        },
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 8",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "gimp:2.8/gimp",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:8"
          ],
          "defaultStatus": "affected"
        },
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 9",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "gimp",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:9"
          ],
          "defaultStatus": "affected"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Improper Null Termination",
              "cweId": "CWE-170",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://access.redhat.com/security/cve/CVE-2026-2239",
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ]
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437675",
          "name": "RHBZ#2437675",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "format": "CVSS",
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "attackVector": "LOCAL",
            "attackComplexity": "LOW",
            "privilegesRequired": "LOW",
            "userInteraction": "REQUIRED",
            "scope": "UNCHANGED",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "availabilityImpact": "LOW",
            "baseScore": 2.8,
            "baseSeverity": "LOW"
          }
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
        }
      ],
      "timeline": [
        {
          "time": "2026-02-09T09:04:28.726Z",
          "lang": "en",
          "value": "Reported to Red Hat."
        },
        {
          "time": "2026-02-09T07:07:00.000Z",
          "lang": "en",
          "value": "Made public."
        }
      ]
    }
  }
}