Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:9308 - Security Advisory
Issued:
2025-06-23
Updated:
2025-06-23

RHSA-2025:9308 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: gimp:2.8 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the gimp:2.8 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.

Security Fix(es):

  • gimp: Multiple use after free in XCF parser (CVE-2025-48798)
  • gimp: Multiple heap buffer overflows in TGA parser (CVE-2025-48797)
  • gimp: GIMP ICO File Parsing Integer Overflow (CVE-2025-5473)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64

Fixes

  • BZ - 2368557 - CVE-2025-48798 gimp: Multiple use after free in XCF parser
  • BZ - 2368558 - CVE-2025-48797 gimp: Multiple heap buffer overflows in TGA parser
  • BZ - 2370867 - CVE-2025-5473 gimp: GIMP ICO File Parsing Integer Overflow

CVEs

  • CVE-2025-5473
  • CVE-2025-48797
  • CVE-2025-48798

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
gimp-2.8.22-16.module+el8.4.0+23302+04229f42.2.src.rpm SHA-256: 5ca59b4e36b3609d92d1fd5b088c68a5a6ebef99c75831b981f9d4c79a198f58
pygobject2-2.28.7-4.module+el8+2760+3d7d61b2.src.rpm SHA-256: 89161d4acfb1217dcc5b4ea4e232eeb8b40d9744cf9c8785ff0183eb4ce1ccb1
pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.src.rpm SHA-256: 8ba19510593bf06bd26ab7c9c82b3f457a4facfb0bd901aba696578dce0ae1fb
python2-pycairo-1.16.3-6.module+el8+2760+3d7d61b2.src.rpm SHA-256: a56385f162203977deddcf0988d03e5c98855fa3b6bae176eab07ccbf04c8855
x86_64
gimp-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: f5988ccc32c20f33e00da5648e2195c90cb31bb5bd098e2780103152e3d9d818
gimp-debuginfo-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: 7796bd6c98ad9e07a61cec6e35689ec89994c55fe3193c0571a16f75d6f2c4e4
gimp-debugsource-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: fac314372b23f76fa48d57a49154eaff9d570da96771471ac21a42af0ae0a325
gimp-devel-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: c71b33fa414609c211f3255f568236748b2203bdd2ccc3703ae50f5158e8696a
gimp-devel-tools-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: 965cf6a0436100e381169b3c37eb0df27e5f724ed9571935becf78e1302c47c9
gimp-devel-tools-debuginfo-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: 92e430fd7dcd7a56645ecc957a95722494d9816b5aba83834c21fee01f6f61e3
gimp-libs-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: 997a26247786bc6dafaac4a2b5bd0b429fe17ed1940b4ab1fa259630763f2fb6
gimp-libs-debuginfo-2.8.22-16.module+el8.4.0+23302+04229f42.2.x86_64.rpm SHA-256: 205c18e27b6f4b0d35f32f48e1dccaf90a53074639ee16dfa9d790066b974c08
pygobject2-2.28.7-4.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 0722e0e1eace67230b3b2285cc4d12e0b801510a61a73227d9afafe3c44e4fd4
pygobject2-codegen-2.28.7-4.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 7b174815b7d3d9d63c6f06a9b9fe9a459b18b1a8fc9d80a2be41d405d9fee116
pygobject2-debuginfo-2.28.7-4.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 88ebab5bfedabdfdbe90c7bf85189475d98d2b2baf99ced111d0be75c0afa79b
pygobject2-debugsource-2.28.7-4.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 377c821e30723f72e4181bd3e1d7ec7ea6462a269ec155a9b550017910cdeb12
pygobject2-devel-2.28.7-4.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 612cbce7dfde755d5979b06e47bc9833d9031abb5eec8dbecb510b71222d623d
pygobject2-doc-2.28.7-4.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 238b8c2d865f299dcaae6eb3efa70107f95f4df96fbaaecb27a07afcb584618a
pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64.rpm SHA-256: f78ac06ae306ed1a55700f11a92f2ac2795e452b3d5a7f557f9a40f4342cd3ce
pygtk2-codegen-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64.rpm SHA-256: 1338dba65d7e7eeeb256ebfeeb0a6dc12924fbca39974e28675226004967aa38
pygtk2-debuginfo-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64.rpm SHA-256: 6e6d246189a688647f8f7124135dfc20ffc1ab719531a77334867f180ebdeb9e
pygtk2-debugsource-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64.rpm SHA-256: 75a540f3d39e9abc528af4d5b8a235ba61cc23168811be7159b218ce43a4f306
pygtk2-devel-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64.rpm SHA-256: 3adac6418d9e6904666b227251a49508c51dae6c32e8c258856a76f670b959ba
pygtk2-doc-2.24.0-25.module+el8.4.0+9382+ff08b506.noarch.rpm SHA-256: 81c28b5b1e14be01cac7c7c93541fcd56b27555d02b2a2c1f58e41745237c6e3
python2-cairo-1.16.3-6.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: ce2b513387d5224348d45ac7cf927a8bbdb18b7999bf43a177c6d10838c95ee8
python2-cairo-debuginfo-1.16.3-6.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: f9a92ae5992e1a3af804aaa8f6bc259a982aa419c099f7d0e1913f2ec12b5642
python2-cairo-devel-1.16.3-6.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 429a1a2f6d367c4eed3ed8411427f2ab99c00f90f2d5a4de0e78d10cd48baa09
python2-pycairo-debugsource-1.16.3-6.module+el8+2760+3d7d61b2.x86_64.rpm SHA-256: 61abdc30c8d7b66346678ea20f88dd31ef426da5a3e7314aafa0cbaa892b35ba

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility