CVE-2026-40919: Out-of-bounds Write in Red Hat Red Hat Enterprise Linux 6
A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plugin, can be exploited when a user opens a specially crafted Seattle Filmworks file. A remote attacker could leverage this to cause a denial of service (DoS), leading to the plugin crashing and potentially impacting the stability of the GIMP application.
AI Analysis
Technical Summary
This vulnerability is a buffer overflow in the file-seattle-filmworks plugin of GIMP on Red Hat Enterprise Linux 6. When a user opens a maliciously crafted Seattle Filmworks file, the plugin may perform an out-of-bounds write, leading to a crash. The CVSS 3.1 base score is 6.1 (medium severity) with attack vector local, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. The vulnerability can cause denial of service by crashing the plugin and potentially affecting GIMP stability. Red Hat has published an advisory but has not indicated an available patch or remediation level.
Potential Impact
Successful exploitation results in denial of service by crashing the file-seattle-filmworks plugin and possibly destabilizing the GIMP application. There is no indication of confidentiality or significant integrity impact. No known active exploitation has been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the Red Hat advisory at https://access.redhat.com/security/cve/CVE-2026-40919 for current remediation guidance. Until a fix is available, avoid opening untrusted Seattle Filmworks files with GIMP on affected systems to prevent triggering the vulnerability.
CVE-2026-40919: Out-of-bounds Write in Red Hat Red Hat Enterprise Linux 6
Description
A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plugin, can be exploited when a user opens a specially crafted Seattle Filmworks file. A remote attacker could leverage this to cause a denial of service (DoS), leading to the plugin crashing and potentially impacting the stability of the GIMP application.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability is a buffer overflow in the file-seattle-filmworks plugin of GIMP on Red Hat Enterprise Linux 6. When a user opens a maliciously crafted Seattle Filmworks file, the plugin may perform an out-of-bounds write, leading to a crash. The CVSS 3.1 base score is 6.1 (medium severity) with attack vector local, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. The vulnerability can cause denial of service by crashing the plugin and potentially affecting GIMP stability. Red Hat has published an advisory but has not indicated an available patch or remediation level.
Potential Impact
Successful exploitation results in denial of service by crashing the file-seattle-filmworks plugin and possibly destabilizing the GIMP application. There is no indication of confidentiality or significant integrity impact. No known active exploitation has been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the Red Hat advisory at https://access.redhat.com/security/cve/CVE-2026-40919 for current remediation guidance. Until a fix is available, avoid opening untrusted Seattle Filmworks files with GIMP on affected systems to prevent triggering the vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2026-04-15T18:38:30.106Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://access.redhat.com/security/cve/CVE-2026-40919","vendor":"Red Hat"}]
Threat ID: 69dfe7b682d89c981f913c56
Added to database: 4/15/2026, 7:32:06 PM
Last enriched: 4/15/2026, 8:02:51 PM
Last updated: 4/16/2026, 6:21:24 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.