No advisories yet.
Solution
No solution given by the vendor.
Workaround
Users should avoid opening untrusted FITS image files with GIMP. If GIMP is not required, consider removing the `gimp` package to eliminate the attack surface. This can be done using the system's package manager, for example: `sudo dnf remove gimp`. Removing GIMP may impact other applications that depend on it.
Wed, 15 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the FITS image loader by providing a specially crafted FITS file. This integer overflow leads to a zero-byte memory allocation, which is then subjected to a heap buffer overflow when processing pixel data. Successful exploitation could result in a denial of service (DoS) or potentially arbitrary code execution. | |
| Title | Gimp: gimp: heap buffer overflow due to integer overflow in fits image loader | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-190 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-15T19:32:55.287Z
Reserved: 2026-04-15T18:38:30.106Z
Link: CVE-2026-40915
Updated: 2026-04-15T19:32:50.839Z
Status : Received
Published: 2026-04-15T20:16:36.717
Modified: 2026-04-15T20:16:36.717
Link: CVE-2026-40915
No data.
OpenCVE Enrichment
No data.