Home

Description

Kitty is a cross-platform GPU based terminal. Versions 0.46.2 and below contain a heap buffer overflow in load_image_data() that allows any process which can write to the terminal's stdin to crash kitty immediately. The vulnerability is triggered by a single APC graphics protocol command with a PNG format declaration (f=100) whose payload exceeds twice the initial buffer capacity. The overflow is attacker-controlled in both length and content, causing DoS and potentially escalation to RCE itself. This issue has been fixed in version 0.47.0.

PUBLISHED Reserved 2026-03-23 | Published 2026-05-19 | Updated 2026-05-20 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

< 0.47.0
affected

References

github.com/.../kitty/security/advisories/GHSA-j68c-v8x4-269g exploit

github.com/.../kitty/security/advisories/GHSA-j68c-v8x4-269g

github.com/...ommit/e9661f0f3afb4e4dbffa509adfb3df3c9780ad34

cve.org (CVE-2026-33633)

nvd.nist.gov (CVE-2026-33633)

Download JSON