-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 02 Jan 2026 14:20:38 +0100
Source: gimp
Architecture: source
Version: 2.10.22-4+deb11u5
Distribution: bullseye-security
Urgency: medium
Maintainer: Debian GNOME Maintainers 
<[email protected]>
Changed-By: Andreas Henriksson <[email protected]>
Changes:
 gimp (2.10.22-4+deb11u5) bullseye-security; urgency=medium
 .
   * Non-maintainer upload by the LTS Security Team.
   * CVE-2025-14422: PNM File Parsing Integer Overflow RCE.
     GIMP PNM File Parsing Integer Overflow Remote Code Execution
     Vulnerability.
     This vulnerability allows remote attackers to execute arbitrary code on
     affected installations of GIMP. User interaction is required to exploit
     this vulnerability in that the target must visit a malicious page or
     open a malicious file. The specific flaw exists within the parsing of
     PNM files. The issue results from the lack of proper validation of
     user-supplied data, which can result in an integer overflow before
     allocating a buffer. An attacker can leverage this vulnerability to
     execute code in the context of the current process. Was ZDI-CAN-28273.
   * CVE-2025-14425: JP2 File Parsing Heap-based Buffer Overflow RCE.
     GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution
     Vulnerability.
     This vulnerability allows remote attackers to execute arbitrary code on
     affected installations of GIMP. User interaction is required to exploit
     this vulnerability in that the target must visit a malicious page or
     open a malicious file. The specific flaw exists within the parsing of
     JP2 files. The issue results from the lack of proper validation of the
     length of user-supplied data prior to copying it to a heap-based buffer.
     An attacker can leverage this vulnerability to execute code in the
     context of the current process. Was ZDI-CAN-28248.
   * CVE-2022-30067: buffer overflow in XCF.
     GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Through a
     crafted XCF file, the program will allocate for a huge amount of memory,
     resulting in insufficient memory or program crash.
Checksums-Sha1:
 949b693cc5158b05bec5cfe4a2e2f2126c8118f0 3470 gimp_2.10.22-4+deb11u5.dsc
 da1687341e846fef784485511809da2988cb8200 33152226 gimp_2.10.22.orig.tar.bz2
 e5f0c9de5b4390d6ccdb6499b01741c3f6afd369 76208 
gimp_2.10.22-4+deb11u5.debian.tar.xz
 9c7e2ce660835eea7af6e2c5625c7b7489302492 9838 
gimp_2.10.22-4+deb11u5_source.buildinfo
Checksums-Sha256:
 6e3d80ea0eab9cd2a6859843aee530447842e0d5db099330d1c241e88aab6b10 3470 
gimp_2.10.22-4+deb11u5.dsc
 2db84b57f3778d80b3466d7c21a21d22e315c7b062de2883cbaaeda9a0f618bb 33152226 
gimp_2.10.22.orig.tar.bz2
 7e4841a68f284a0bb71a721466f906029b0ded05e14694210d7692eb17130ff8 76208 
gimp_2.10.22-4+deb11u5.debian.tar.xz
 49d17a34049ad94c3f87d1d3e62ed0729350d8ea66e96e8a642369eb21838ed7 9838 
gimp_2.10.22-4+deb11u5_source.buildinfo
Files:
 f7fa854b21d077d137d9b6cdd3fd275f 3470 graphics optional 
gimp_2.10.22-4+deb11u5.dsc
 9d559ba6f039da033754f1d62a91cc39 33152226 graphics optional 
gimp_2.10.22.orig.tar.bz2
 7b02e7a7eea90aea57ab77989f1a6d97 76208 graphics optional 
gimp_2.10.22-4+deb11u5.debian.tar.xz
 a8c569a60174957fd5c2ff903d460164 9838 graphics optional 
gimp_2.10.22-4+deb11u5_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=V91t
-----END PGP SIGNATURE-----

Attachment: pgpGhGcw9qyPx.pgp
Description: PGP signature

Reply via email to