Ubuntu alert USN-8057-1 (gimp)
| From: | noreply+usn-bot@canonical.com | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-8057-1] GIMP vulnerabilities | |
| Date: | Mon, 23 Feb 2026 21:26:08 +0000 | |
| Message-ID: | <E1vudRQ-0001MO-Gg@lists.ubuntu.com> |
========================================================================== Ubuntu Security Notice USN-8057-1 February 23, 2026 gimp vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in GIMP. Software Description: - gimp: GNU Image Manipulation Program Details: Hanno Böck discovered that GIMP allocated FLI images using only the information present in the file header, which allowed for a maliciously- crafted file to cause out-of-bounds writes. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-17785) Michael Randrianantenaina discovered that that opening a maliciously crafted FLI file could cause GIMP to index out-of-bounds. An attacker could possibly use this issue to cause a denial or service or execute arbitrary code. (CVE-2025-2761) It was discovered that opening a maliciously-crafted DCM file could cause GIMP to index out-of-bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-10922) It was discovered that GIMP's JP2 parser did not account for precision when allocating an image buffer. An attacker could possibly use this to cause a denial of service or execute arbitrary code when a maliciously crafted file is opened. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2025-14425) It was discovered that GIMP's PSP parser erroneously queried the color channels of a greyscale image, which resulted in an invalid memory pointer. An attacker could possibly use this to cause a denial of service or execute arbitrary code when a maliciously-crafted file is opened. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2025-15059) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS gimp 2.10.36-3ubuntu0.24.04.1+esm1 Available with Ubuntu Pro libgimp2.0t64 2.10.36-3ubuntu0.24.04.1+esm1 Available with Ubuntu Pro Ubuntu 22.04 LTS gimp 2.10.30-1ubuntu0.1+esm1 Available with Ubuntu Pro libgimp2.0 2.10.30-1ubuntu0.1+esm1 Available with Ubuntu Pro Ubuntu 20.04 LTS gimp 2.10.18-1ubuntu0.1+esm1 Available with Ubuntu Pro libgimp2.0 2.10.18-1ubuntu0.1+esm1 Available with Ubuntu Pro Ubuntu 18.04 LTS gimp 2.8.22-1ubuntu0.1~esm1 Available with Ubuntu Pro libgimp2.0 2.8.22-1ubuntu0.1~esm1 Available with Ubuntu Pro Ubuntu 16.04 LTS gimp 2.8.16-1ubuntu1.1+esm1 Available with Ubuntu Pro libgimp2.0 2.8.16-1ubuntu1.1+esm1 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8057-1 CVE-2017-17785, CVE-2025-10922, CVE-2025-14425, CVE-2025-15059, CVE-2025-2761
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmcwkAACgkQcpJm3tlz hgHJ8g//crwY2NzcrdTndqfp09cBkXx1WhFF6fBp+TKJR1KFpHUUWWz1bTvgY1LN 0XkcjEuE15E2no59Ot9+HgHO7gUcwQKxSDklJ1H5P4L0We8RlmzvG17hFfJoljn/ 5wqp1efzaoho5vCkrbXVoAZXn64bFP14qVIvpd5tCESUorzirAGT2Ka9fXIDIuDG LeveDd/lAwZhoa6o71ObQL1zp9/SCs/MT7weooTWsbdUO808q88yKKsi6AB1bjj9 FYRMKjEyZ7d8RChB4OuzuIn6R8aKEQLX/Nm6htPMYK92IYMADxYTHnzzBQpt2jMZ aFqakNphKkysBs4CVTAwHXOqJRNsJQVFytPQhGQt4efR8gUmLnjHHKWJP7vhqB7I LJD/HJRd3BL3sKf3gpIIJCKizKHR5hANVzJPMEPioJTN3rzWdVvt0yQRraPl6rnA olAi0xBA9A1rSFbt/S3XeS3s9FW8DdLaGKirBdpXeGctnuvw+p8WLoWFMmhrQZbb mYv339qenD3L2BUftnwV6omkmPBoXMQ8akvnQR8QKVhc5m6v9flxTP+imalX28qY UvM4agK6ZrUJoaStwwNFJFBlgeXXOueP9i9XJxrRbeX7IkMCeB6PaauS2yGH6wXx K9fSGrXvf1dQLsaQaOkyC7DH74IF2KFYvng7SAcBxteZgX7wvCM= =/jjG -----END PGP SIGNATURE-----
