No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 25 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Happyseafox
Happyseafox sail |
|
| Vendors & Products |
Happyseafox
Happyseafox sail |
Fri, 20 Feb 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can provide an XWD file with an arbitrarily large bytes_per_line, causing a massive write operation beyond the buffer heap allocated for the image pixels. The issue did not have a fix at the time of publication. | |
| Title | SAIL: Heap-based Buffer Overflow in Sail-codecs-xwd | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T21:27:45.488Z
Reserved: 2026-02-18T00:18:53.963Z
Link: CVE-2026-27168
Updated: 2026-02-25T21:27:40.748Z
Status : Awaiting Analysis
Published: 2026-02-21T00:16:16.640
Modified: 2026-02-23T18:13:53.397
Link: CVE-2026-27168
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:33:00Z