<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gimp</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20100-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-21T13:31:29Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-21T13:31:29Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-21T13:31:29Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gimp</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for gimp fixes the following issues:

Changes in gimp:

- CVE-2025-14422: Fixed PNM File Parsing Integer Overflow (bsc#1255293)
- CVE-2025-14423: Fixed LBM File Parsing Stack-based Buffer Overflow (bsc#1255294)
- CVE-2025-14424: Fixed XCF File Parsing Use-After-Free (bsc#1255295)
- CVE-2025-14425: Fixed JP2 File Parsing Heap-based Buffer Overflow(bsc#1255296)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-packagehub-88</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255293</URL>
      <Description>SUSE Bug 1255293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255294</URL>
      <Description>SUSE Bug 1255294</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255295</URL>
      <Description>SUSE Bug 1255295</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255296</URL>
      <Description>SUSE Bug 1255296</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14422/</URL>
      <Description>SUSE CVE CVE-2025-14422 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14423/</URL>
      <Description>SUSE CVE CVE-2025-14423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14424/</URL>
      <Description>SUSE CVE CVE-2025-14424 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14425/</URL>
      <Description>SUSE CVE CVE-2025-14425 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gimp-3.0.6-bp160.2.1">
      <FullProductName ProductID="gimp-3.0.6-bp160.2.1">gimp-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-devel-3.0.6-bp160.2.1">
      <FullProductName ProductID="gimp-devel-3.0.6-bp160.2.1">gimp-devel-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-extension-goat-excercises-3.0.6-bp160.2.1">
      <FullProductName ProductID="gimp-extension-goat-excercises-3.0.6-bp160.2.1">gimp-extension-goat-excercises-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-lang-3.0.6-bp160.2.1">
      <FullProductName ProductID="gimp-lang-3.0.6-bp160.2.1">gimp-lang-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-plugin-aa-3.0.6-bp160.2.1">
      <FullProductName ProductID="gimp-plugin-aa-3.0.6-bp160.2.1">gimp-plugin-aa-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-plugin-python3-3.0.6-bp160.2.1">
      <FullProductName ProductID="gimp-plugin-python3-3.0.6-bp160.2.1">gimp-plugin-python3-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-vala-3.0.6-bp160.2.1">
      <FullProductName ProductID="gimp-vala-3.0.6-bp160.2.1">gimp-vala-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgimp-3_0-0-3.0.6-bp160.2.1">
      <FullProductName ProductID="libgimp-3_0-0-3.0.6-bp160.2.1">libgimp-3_0-0-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgimpui-3_0-0-3.0.6-bp160.2.1">
      <FullProductName ProductID="libgimpui-3_0-0-3.0.6-bp160.2.1">libgimpui-3_0-0-3.0.6-bp160.2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gimp-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1">gimp-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-devel-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1">gimp-devel-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-extension-goat-excercises-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1">gimp-extension-goat-excercises-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-lang-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1">gimp-lang-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-plugin-aa-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1">gimp-plugin-aa-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-plugin-python3-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1">gimp-plugin-python3-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-vala-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1">gimp-vala-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgimp-3_0-0-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1">libgimp-3_0-0-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgimpui-3_0-0-3.0.6-bp160.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1">libgimpui-3_0-0-3.0.6-bp160.2.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.</Note>
    </Notes>
    <CVE>CVE-2025-14422</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14422.html</URL>
        <Description>CVE-2025-14422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255293</URL>
        <Description>SUSE Bug 1255293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.</Note>
    </Notes>
    <CVE>CVE-2025-14423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14423.html</URL>
        <Description>CVE-2025-14423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255294</URL>
        <Description>SUSE Bug 1255294</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.</Note>
    </Notes>
    <CVE>CVE-2025-14424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14424.html</URL>
        <Description>CVE-2025-14424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255295</URL>
        <Description>SUSE Bug 1255295</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.</Note>
    </Notes>
    <CVE>CVE-2025-14425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:gimp-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-devel-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-extension-goat-excercises-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-lang-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-aa-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-plugin-python3-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gimp-vala-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimp-3_0-0-3.0.6-bp160.2.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgimpui-3_0-0-3.0.6-bp160.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14425.html</URL>
        <Description>CVE-2025-14425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255296</URL>
        <Description>SUSE Bug 1255296</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
