A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail generation. Successful exploitation leads to application crashes and denial of service (DoS) conditions.
References
Configurations
Configuration 1 (hide)
|
History
01 May 2026, 19:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/errata/RHSA-2026:10707 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:10708 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:10741 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:11325 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:11326 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:11327 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:11328 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:11806 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:12060 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:12061 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:12062 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:12114 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2026:12115 - Third Party Advisory | |
| References | () https://access.redhat.com/security/cve/CVE-2026-5201 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453291 - Issue Tracking, Third Party Advisory | |
| References | () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/304 - Issue Tracking, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2026/04/msg00010.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:gnome:gdk-pixbuf:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
| First Time |
Redhat
Gnome Redhat enterprise Linux Redhat enterprise Linux Server Tus Gnome gdk-pixbuf Redhat enterprise Linux Server Aus |
30 Apr 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Apr 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Apr 2026, 08:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Apr 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Apr 2026, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 Apr 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
31 Mar 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 09:16
Updated : 2026-05-01 19:14
NVD link : CVE-2026-5201
Mitre link : CVE-2026-5201
CVE.ORG link : CVE-2026-5201
JSON object : View
Products Affected
gnome
- gdk-pixbuf
redhat
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux
CWE
CWE-122
Heap-based Buffer Overflow
