File _patchinfo of Package patchinfo.43343

<patchinfo incident="43343">
  <!--generated with prepare-update from request 404323-->
  <issue tracker="bnc" id="1259979">VUL-0: CVE-2026-4150: gimp: PSD File Parsing Integer Overflow Remote Code Execution Vulnerability</issue>
  <issue tracker="bnc" id="1259984">VUL-0: CVE-2026-4153: gimp: PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability</issue>
  <issue tracker="bnc" id="1259986">VUL-0: CVE-2026-4154: gimp: XPM File Parsing Integer Overflow Remote Code Execution Vulnerability</issue>
  <issue tracker="cve" id="2026-4150"/>
  <issue tracker="cve" id="2026-4153"/>
  <issue tracker="cve" id="2026-4154"/>
  <category>security</category>
  <rating>important</rating>
  <packager>AZhou</packager>
  <summary>Security update for gimp</summary>
  <description>This update for gimp fixes the following issues:

- CVE-2026-4150: PSD File Parsing Integer Overflow Remote Code Execution Vulnerability (bsc#1259979).
- CVE-2026-4153: PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability (bsc#1259984).
- CVE-2026-4154: XPM File Parsing Integer Overflow Remote Code Execution Vulnerability (bsc#1259986).
</description>
</patchinfo>
openSUSE Build Service is sponsored by