Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2006:0598 - Security Advisory
Issued:
2006-07-18
Updated:
2006-07-18

RHSA-2006:0598 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

gimp security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gimp packages that fix a security issue are now available for Red
Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The GIMP (GNU Image Manipulation Program) is an image composition and
editing program.

Henning Makholm discovered a buffer overflow bug in The GIMP XCF file
loader. An attacker could create a carefully crafted image that could
execute arbitrary code if opened by a victim. (CVE-2006-3404)

Please note that this issue did not affect the gimp packages in Red Hat
Enterprise Linux 2.1, or 3.

Users of The GIMP should update to these erratum packages which contain a
backported fix to correct this issue.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 198269 - CVE-2006-3404 gimp xcf buffer overflow

CVEs

  • CVE-2006-3404

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
gimp-2.0.5-6.src.rpm SHA-256: 25026a489f7b09f33033162e33234de5c5d0ff683804c94ea9224a6bbb836dfd
x86_64
gimp-2.0.5-6.x86_64.rpm SHA-256: 3bbb4c4e76a1802be8e6fde6864b6882548b78b5e56799f3e9d572d112cb6226
gimp-2.0.5-6.x86_64.rpm SHA-256: 3bbb4c4e76a1802be8e6fde6864b6882548b78b5e56799f3e9d572d112cb6226
gimp-devel-2.0.5-6.x86_64.rpm SHA-256: 04792db1c35b64d0d0de6cece988003cd49f7d2f961f6fd51fa8b1d443d63e38
gimp-devel-2.0.5-6.x86_64.rpm SHA-256: 04792db1c35b64d0d0de6cece988003cd49f7d2f961f6fd51fa8b1d443d63e38
ia64
gimp-2.0.5-6.ia64.rpm SHA-256: a97375ccc9a88cdb7db9a4368563ef4877f740b19359f3217d960c562b6db7ca
gimp-2.0.5-6.ia64.rpm SHA-256: a97375ccc9a88cdb7db9a4368563ef4877f740b19359f3217d960c562b6db7ca
gimp-devel-2.0.5-6.ia64.rpm SHA-256: 173b47075838e22d63c525ea6f244e7234f36078b2b7d09e4b577a5bf5904c77
gimp-devel-2.0.5-6.ia64.rpm SHA-256: 173b47075838e22d63c525ea6f244e7234f36078b2b7d09e4b577a5bf5904c77
i386
gimp-2.0.5-6.i386.rpm SHA-256: 66d7a330a586233b7e8bf98fcce0f3bd40e853ba832d50f5f518a05812e359fa
gimp-2.0.5-6.i386.rpm SHA-256: 66d7a330a586233b7e8bf98fcce0f3bd40e853ba832d50f5f518a05812e359fa
gimp-devel-2.0.5-6.i386.rpm SHA-256: f6e5479320e4b677447ca478edb953ed65f36b55b63c7f625fca525cb917af77
gimp-devel-2.0.5-6.i386.rpm SHA-256: f6e5479320e4b677447ca478edb953ed65f36b55b63c7f625fca525cb917af77

Red Hat Enterprise Linux Workstation 4

SRPM
gimp-2.0.5-6.src.rpm SHA-256: 25026a489f7b09f33033162e33234de5c5d0ff683804c94ea9224a6bbb836dfd
x86_64
gimp-2.0.5-6.x86_64.rpm SHA-256: 3bbb4c4e76a1802be8e6fde6864b6882548b78b5e56799f3e9d572d112cb6226
gimp-devel-2.0.5-6.x86_64.rpm SHA-256: 04792db1c35b64d0d0de6cece988003cd49f7d2f961f6fd51fa8b1d443d63e38
ia64
gimp-2.0.5-6.ia64.rpm SHA-256: a97375ccc9a88cdb7db9a4368563ef4877f740b19359f3217d960c562b6db7ca
gimp-devel-2.0.5-6.ia64.rpm SHA-256: 173b47075838e22d63c525ea6f244e7234f36078b2b7d09e4b577a5bf5904c77
i386
gimp-2.0.5-6.i386.rpm SHA-256: 66d7a330a586233b7e8bf98fcce0f3bd40e853ba832d50f5f518a05812e359fa
gimp-devel-2.0.5-6.i386.rpm SHA-256: f6e5479320e4b677447ca478edb953ed65f36b55b63c7f625fca525cb917af77

Red Hat Enterprise Linux Desktop 4

SRPM
gimp-2.0.5-6.src.rpm SHA-256: 25026a489f7b09f33033162e33234de5c5d0ff683804c94ea9224a6bbb836dfd
x86_64
gimp-2.0.5-6.x86_64.rpm SHA-256: 3bbb4c4e76a1802be8e6fde6864b6882548b78b5e56799f3e9d572d112cb6226
gimp-devel-2.0.5-6.x86_64.rpm SHA-256: 04792db1c35b64d0d0de6cece988003cd49f7d2f961f6fd51fa8b1d443d63e38
i386
gimp-2.0.5-6.i386.rpm SHA-256: 66d7a330a586233b7e8bf98fcce0f3bd40e853ba832d50f5f518a05812e359fa
gimp-devel-2.0.5-6.i386.rpm SHA-256: f6e5479320e4b677447ca478edb953ed65f36b55b63c7f625fca525cb917af77

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
gimp-2.0.5-6.src.rpm SHA-256: 25026a489f7b09f33033162e33234de5c5d0ff683804c94ea9224a6bbb836dfd
s390x
gimp-2.0.5-6.s390x.rpm SHA-256: 1109a16e310b4cd2362ff9cd32aa9af343dcb951e68394a634e8bfc990fc4128
gimp-devel-2.0.5-6.s390x.rpm SHA-256: bc6bd1c3011b3d6a70addeb8d2b5b55d3f5bdee42437be21176ef19017010708
s390
gimp-2.0.5-6.s390.rpm SHA-256: dbbc3fb0ddb0940dfb537ff1f3dbd7ca5028294615f2a74554ecfd7d7e9e6e0f
gimp-devel-2.0.5-6.s390.rpm SHA-256: 8248a5c96978e0a4c9c4a645f682bacdef96a6cea3ebdc762518cbeb9d3e4d96

Red Hat Enterprise Linux for Power, big endian 4

SRPM
gimp-2.0.5-6.src.rpm SHA-256: 25026a489f7b09f33033162e33234de5c5d0ff683804c94ea9224a6bbb836dfd
ppc
gimp-2.0.5-6.ppc.rpm SHA-256: eae23d7ec2e980a6a7213336f9baab60787142299c680258b043efd6c1f08ff4
gimp-devel-2.0.5-6.ppc.rpm SHA-256: 0b51f6bc45fd4f1aafef39ee2cb71dfa8d6f6c9ef358e906e44a6a6a49bd42c6

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility