Description
Kitty is a cross-platform GPU based terminal. Versions 0.46.2 and below contain a heap buffer overflow in load_image_data() that allows any process which can write to the terminal's stdin to crash kitty immediately. The vulnerability is triggered by a single APC graphics protocol command with a PNG format declaration (f=100) whose payload exceeds twice the initial buffer capacity. The overflow is attacker-controlled in both length and content, causing DoS and potentially escalation to RCE itself. This issue has been fixed in version 0.47.0.
Published: 2026-05-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Kitty, a cross‑platform GPU‑based terminal, contains a heap buffer overflow in its graphics protocol handler. The flaw resides in the load_image_data() function that processes APC graphics commands and allocates an initial buffer for PNG image data. A single command containing a PNG format declaration with the flag f=100 and a payload larger than twice the allocated buffer overflows the heap. The attacker can control both the length and content of the overflow, causing the kitty process to crash and providing an entry to potentially execute arbitrary code. Based on the description it is inferred that the overflow could be leveraged to run code within the kitty process, which may further lead to remote code execution if the attacker can inject additional malicious data after the crash.

Affected Systems

All releases of kovidgoyal:kitty version 0.46.2 and earlier are affected. The vulnerability does not specify particular operating systems; the application runs on Linux, macOS and Windows. Any environment where a process can write to the terminal’s standard input is susceptible, because the overflow is triggered by input sent through stdin.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. No EPSS score is available, so the likelihood of exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a local or shared terminal scenario where an unprivileged user can inject data through stdin. The immediate effect is denial of service via a crash, and the overflow also creates a potential avenue for code execution as implied by the description.

Generated by OpenCVE AI on May 19, 2026 at 20:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Kitty 0.47.0 or later to patch the heap buffer overflow
  • If an upgrade is not possible, restrict write permissions to the terminal’s stdin or disable the APC graphics protocol to prevent malicious commands
  • Implement host‑based monitoring or logging to detect unusually large PNG payloads over stdin and automatically block offending processes

Generated by OpenCVE AI on May 19, 2026 at 20:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Kovidgoyal
Kovidgoyal kitty
Vendors & Products Kovidgoyal
Kovidgoyal kitty

Tue, 19 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Kitty is a cross-platform GPU based terminal. Versions 0.46.2 and below contain a heap buffer overflow in load_image_data() that allows any process which can write to the terminal's stdin to crash kitty immediately. The vulnerability is triggered by a single APC graphics protocol command with a PNG format declaration (f=100) whose payload exceeds twice the initial buffer capacity. The overflow is attacker-controlled in both length and content, causing DoS and potentially escalation to RCE itself. This issue has been fixed in version 0.47.0.
Title Kitty has a Heap Buffer Overflow in its Graphics Protocol Handler
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Kovidgoyal Kitty
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-20T03:55:46.409Z

Reserved: 2026-03-23T14:24:11.618Z

Link: CVE-2026-33633

cve-icon Vulnrichment

Updated: 2026-05-19T17:56:33.521Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T18:16:21.343

Modified: 2026-05-19T21:08:41.030

Link: CVE-2026-33633

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T20:30:13Z

Weaknesses