Home

Description

Kitty is a cross-platform GPU based terminal. In versions 0.46.2 and below, the handle_compose_command() function in kitty/graphics.c performs bounds validation on composition offsets using unsigned 32-bit arithmetic that is subject to integer wrapping, potentially leading to Heap Buffer Over-Read/Write. An attacker who can write escape sequences to a kitty terminal (e.g., via a malicious file, SSH login banner, or piped content) can supply crafted x_offset/y_offset values that pass the bounds check after wrapping but cause massive out-of-bounds heap memory access in compose_rectangles(). No user interaction is required. No non-default configuration is required. The attacker only needs the ability to produce output in a kitty terminal window. This issue has been fixed in version 0.47.0.

PUBLISHED Reserved 2026-03-23 | Published 2026-05-19 | Updated 2026-05-19 | Assigner GitHub_M




CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H

Problem types

CWE-190: Integer Overflow or Wraparound

CWE-787: Out-of-bounds Write

CWE-125: Out-of-bounds Read

Product status

< 0.47.0
affected

References

github.com/.../kitty/security/advisories/GHSA-qfgm-2c64-6x3x exploit

github.com/.../kitty/security/advisories/GHSA-qfgm-2c64-6x3x

github.com/...ommit/e9661f0f3afb4e4dbffa509adfb3df3c9780ad34

cve.org (CVE-2026-33642)

nvd.nist.gov (CVE-2026-33642)

Download JSON