Medium severity4.3NVD Advisory· Published Mar 26, 2026· Updated Apr 3, 2026
CVE-2026-2272
CVE-2026-2272
Description
A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the ico_read_info and ico_read_icon functions. This issue arises because a size calculation for image buffers can wrap around due to a 32-bit integer evaluation, allowing oversized image headers to bypass security checks. A remote attacker could exploit this by providing a specially crafted ICO file, leading to a buffer overflow and memory corruption, which may result in an application level denial of service.
Affected products
5cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- bugzilla.redhat.com/show_bug.cginvdExploitIssue TrackingThird Party Advisory
- gitlab.gnome.org/GNOME/gimp/-/issues/15617nvdExploitIssue Tracking
- access.redhat.com/security/cve/CVE-2026-2272nvdThird Party Advisory
News mentions
0No linked articles in our index yet.