DEBIAN-CVE-2026-6384

Source
https://security-tracker.debian.org/tracker/CVE-2026-6384
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-6384.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-6384
Upstream
  • CVE-2026-6384
Published
2026-04-16T09:00:25.193740Z
Modified
2026-04-19T20:00:17.936746Z
Summary
[none]
Details

A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's ReadJeffsImage function allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file. This can lead to a denial of service or potentially arbitrary code execution.

References

Affected packages

Debian:14 / gimp

Package

Name
gimp
Purl
pkg:deb/debian/gimp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.2-1

Affected versions

3.*
3.0.4-3
3.0.4-4
3.0.4-5
3.0.4-6
3.0.4-6.1
3.0.4-6.2
3.0.6-1
3.2.0~RC2-1
3.2.0~RC2-2
3.2.0~RC2-3
3.2.0~RC2-3.1
3.2.0~RC2-3.2
3.2.0~RC2-3.3
3.2.0~RC3-1
3.2.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-6384.json"