A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can lead to a denial of service (DoS). This occurs due to a stack-based buffer overflow and an out-of-bounds read in the PVR image loader, causing the application to crash. Systems that process untrusted PVR image files are affected.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

To reduce the risk associated with this vulnerability, avoid processing untrusted PVR image files. Users should exercise caution when opening PVR files from unknown or suspicious sources. If the PVR image loader is part of an application that processes untrusted content, consider running that application in a sandboxed environment to limit potential impact.

History

Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Gimp
Gimp gimp
Vendors & Products Gimp
Gimp gimp

Thu, 16 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can lead to a denial of service (DoS). This occurs due to a stack-based buffer overflow and an out-of-bounds read in the PVR image loader, causing the application to crash. Systems that process untrusted PVR image files are affected.
Title Gimp: gimp: denial of service via crafted pvr image file
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-131
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-15T18:59:14.823Z

Reserved: 2026-04-15T18:38:30.106Z

Link: CVE-2026-40918

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-15T20:16:37.260

Modified: 2026-04-15T20:16:37.260

Link: CVE-2026-40918

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-15T18:41:40Z

Links: CVE-2026-40918 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:12:17Z

Weaknesses