[ALSA-2026:16484] Important: gimp security update
Type:
security
Severity:
important
Release date:
2026-05-14
Description:
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image (CVE-2026-4887) * gimp: GIMP: Remote Code Execution via XPM File Parsing Integer Overflow (CVE-2026-4154) * gimp: GIMP: Remote Code Execution via ANI File Parsing Integer Overflow (CVE-2026-4151) * gimp: GIMP: Remote Code Execution via malicious JP2 file parsing (CVE-2026-4152) * GIMP: GIMP: Arbitrary code execution via specially crafted PSD file (CVE-2026-4150) * gimp: GIMP: Remote Code Execution via PSP file parsing (CVE-2026-4153) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 gimp-libs-3.0.4-1.el9_7.5.aarch64.rpm 7fe19f72c5f1d3b7950c9e2218fa7b2e6250bdbe1830e612f0e42378a6768ee1
aarch64 gimp-3.0.4-1.el9_7.5.aarch64.rpm 93de38b650ecf41ceac1ac48b986a013b466d9476373dbd186db5e23bc7c7632
i686 gimp-libs-3.0.4-1.el9_7.5.i686.rpm 263d9a5b10d38fd085bb798a49ad09f0c142097ae4416e47ae866de1541ac661
ppc64le gimp-libs-3.0.4-1.el9_7.5.ppc64le.rpm a9e0b8b16a5298647c1bbc0a77cf3711998ed905e6408b1472068e2808086731
ppc64le gimp-3.0.4-1.el9_7.5.ppc64le.rpm cef35278c67903439780623c4cf499bca10d49bc9923fa2e9d95835b27aab52b
x86_64 gimp-3.0.4-1.el9_7.5.x86_64.rpm 81cea0297bcf950bdc305f44aa70358916027c081c9d4c613f6940a8a155a30d
x86_64 gimp-libs-3.0.4-1.el9_7.5.x86_64.rpm d27c9ea8e34c83855a77dd3419029ee0f803476d98685abcf743e3a7e9e48d38
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.