CVE-2026-40917
Received Received - Intake
Heap Buffer Over-read in GIMP icns_slurp() Causes Crashes

Publication date: 2026-04-15

Last updated on: 2026-04-28

Assigner: Red Hat, Inc.

Description
A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` function, occurs when processing specially crafted ICNS image files. An attacker could provide a malicious ICNS file, potentially leading to application crashes or information disclosure on systems that process such files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-28
Generated
2026-05-06
AI Q&A
2026-04-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 7.0
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
gimp gimp *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in GIMP related to a heap buffer over-read in the icns_slurp() function, which processes ICNS image files.

It occurs when GIMP processes specially crafted malicious ICNS files, allowing an attacker to exploit this flaw.

The exploitation can cause the application to crash or potentially lead to information disclosure.


How can this vulnerability impact me? :

If exploited, this vulnerability can cause GIMP to crash, disrupting normal use of the application.

Additionally, it may lead to information disclosure on systems that process malicious ICNS files, potentially exposing sensitive data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability occurs when GIMP processes specially crafted ICNS image files, leading to potential application crashes or information disclosure.

Detection involves monitoring for crashes or abnormal behavior in GIMP when opening ICNS files.

There are no specific commands provided in the available resources to detect this vulnerability directly on your system or network.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid opening untrusted or suspicious ICNS image files with GIMP.

Apply any available patches or updates to GIMP provided by your Linux distribution or the GIMP project as soon as they are released.

Consider restricting user permissions to limit the impact of potential exploitation, as the attack vector requires local access with low privileges.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in GIMP involves a heap buffer over-read that can lead to information disclosure when processing malicious ICNS files.

Such information disclosure could potentially impact compliance with data protection regulations like GDPR or HIPAA if sensitive or personal data is exposed as a result of exploitation.

However, there is no specific information provided about the nature of the data at risk or the extent to which this vulnerability directly affects compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart