No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kovidgoyal
Kovidgoyal kitty |
|
| Vendors & Products |
Kovidgoyal
Kovidgoyal kitty |
Tue, 19 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kitty is a cross-platform GPU based terminal. Versions 0.46.2 and below contain a heap buffer overflow in load_image_data() that allows any process which can write to the terminal's stdin to crash kitty immediately. The vulnerability is triggered by a single APC graphics protocol command with a PNG format declaration (f=100) whose payload exceeds twice the initial buffer capacity. The overflow is attacker-controlled in both length and content, causing DoS and potentially escalation to RCE itself. This issue has been fixed in version 0.47.0. | |
| Title | Kitty has a Heap Buffer Overflow in its Graphics Protocol Handler | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-19T17:56:41.989Z
Reserved: 2026-03-23T14:24:11.618Z
Link: CVE-2026-33633
Updated: 2026-05-19T17:56:33.521Z
Status : Received
Published: 2026-05-19T18:16:21.343
Modified: 2026-05-19T18:16:21.343
Link: CVE-2026-33633
No data.
OpenCVE Enrichment
Updated: 2026-05-19T18:30:11Z