Source: sail
Version: 0.9.10-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for sail.

CVE-2026-27168[0]:
| SAIL is a cross-platform library for loading and saving images with
| support for animation, metadata, and ICC profiles. All versions are
| vulnerable to Heap-based Buffer Overflow through the XWD parser's
| use of the bytes_per_line value. The value os read directly from the
| file as the read size in io->strict_read(), and is never compared to
| the actual size of the destination buffer. An attacker can provide
| an XWD file with an arbitrarily large bytes_per_line, causing a
| massive write operation beyond the buffer heap allocated for the
| image pixels. The issue did not have a fix at the time of
| publication.

To date, AFAIK, no upstream fix is available.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-27168
    https://www.cve.org/CVERecord?id=CVE-2026-27168
[1] https://github.com/HappySeaFox/sail/security/advisories/GHSA-3g38-x2pj-mv55

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to