CVE-2026-5201

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail generation. Successful exploitation leads to application crashes and denial of service (DoS) conditions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:gdk-pixbuf:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*

History

01 May 2026, 19:14

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2026:10707 - () https://access.redhat.com/errata/RHSA-2026:10707 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:10708 - () https://access.redhat.com/errata/RHSA-2026:10708 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:10741 - () https://access.redhat.com/errata/RHSA-2026:10741 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:11325 - () https://access.redhat.com/errata/RHSA-2026:11325 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:11326 - () https://access.redhat.com/errata/RHSA-2026:11326 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:11327 - () https://access.redhat.com/errata/RHSA-2026:11327 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:11328 - () https://access.redhat.com/errata/RHSA-2026:11328 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:11806 - () https://access.redhat.com/errata/RHSA-2026:11806 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:12060 - () https://access.redhat.com/errata/RHSA-2026:12060 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:12061 - () https://access.redhat.com/errata/RHSA-2026:12061 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:12062 - () https://access.redhat.com/errata/RHSA-2026:12062 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:12114 - () https://access.redhat.com/errata/RHSA-2026:12114 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2026:12115 - () https://access.redhat.com/errata/RHSA-2026:12115 - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2026-5201 - () https://access.redhat.com/security/cve/CVE-2026-5201 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2453291 - () https://bugzilla.redhat.com/show_bug.cgi?id=2453291 - Issue Tracking, Third Party Advisory
References () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/304 - () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/304 - Issue Tracking, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2026/04/msg00010.html - () https://lists.debian.org/debian-lts-announce/2026/04/msg00010.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdk-pixbuf:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
First Time Redhat
Gnome
Redhat enterprise Linux
Redhat enterprise Linux Server Tus
Gnome gdk-pixbuf
Redhat enterprise Linux Server Aus

30 Apr 2026, 13:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2026:11806 -
  • () https://access.redhat.com/errata/RHSA-2026:12060 -
  • () https://access.redhat.com/errata/RHSA-2026:12061 -
  • () https://access.redhat.com/errata/RHSA-2026:12062 -
  • () https://access.redhat.com/errata/RHSA-2026:12114 -
  • () https://access.redhat.com/errata/RHSA-2026:12115 -

28 Apr 2026, 09:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2026:11327 -
  • () https://access.redhat.com/errata/RHSA-2026:11328 -

28 Apr 2026, 08:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2026:11325 -
  • () https://access.redhat.com/errata/RHSA-2026:11326 -

27 Apr 2026, 10:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2026:10707 -
  • () https://access.redhat.com/errata/RHSA-2026:10741 -

27 Apr 2026, 03:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2026:10708 -

14 Apr 2026, 12:16

Type Values Removed Values Added
Summary
  • (es) Se encontró un fallo en la biblioteca gdk-pixbuf. Esta vulnerabilidad de desbordamiento de búfer basado en montículo ocurre en el cargador de imágenes JPEG debido a una validación incorrecta del recuento de componentes de color al procesar una imagen JPEG especialmente diseñada. Un atacante remoto puede explotar este fallo sin interacción del usuario, por ejemplo, a través de la generación de miniaturas. La explotación exitosa conduce a bloqueos de la aplicación y condiciones de denegación de servicio (DoS).
References
  • () https://lists.debian.org/debian-lts-announce/2026/04/msg00010.html -

31 Mar 2026, 09:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 09:16

Updated : 2026-05-01 19:14


NVD link : CVE-2026-5201

Mitre link : CVE-2026-5201

CVE.ORG link : CVE-2026-5201


JSON object : View

Products Affected

gnome

  • gdk-pixbuf

redhat

  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • enterprise_linux
CWE
CWE-122

Heap-based Buffer Overflow