Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1693

NIXPKGS-2026-1693
published on
Permalink CVE-2026-33633
7.5 HIGH
  • CVSS version (CVSS): 3.1
  • Attack Vector (AV): Network (N)
  • Attack Complexity (AC): High (H)
  • Privileges Required (PR): None (N)
  • User Interaction (UI): Required (R)
  • Scope (S): Unchanged (U)
  • Confidentiality (C): High (H)
  • Integrity (I): High (H)
  • Availability (A): High (H)
  • Modified Attack Vector (MAV): Network (N)
  • Modified Attack Complexity (MAC): High (H)
  • Modified Privileges Required (MPR): None (N)
  • Modified User Interaction (MUI): Required (R)
  • Modified Confidentiality (MC): High (H)
  • Modified Scope (MS): Unchanged (U)
  • Modified Integrity (MI): High (H)
  • Modified Availability (MA): High (H)
updated 2 days, 12 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    9 packages
    • kittysay
    • kitty-img
    • kitty-themes
    • kittycad-kcl-lsp
    • mailman-hyperkitty
    • haskellPackages.discokitty
    • mailmanPackages.hyperkitty
    • mailmanPackages.mailman-hyperkitty
    • vimPlugins.nvim-treesitter-parsers.kitty
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kitty has a Heap Buffer Overflow in its Graphics Protocol Handler

Kitty is a cross-platform GPU based terminal. Versions 0.46.2 and below contain a heap buffer overflow in load_image_data() that allows any process which can write to the terminal's stdin to crash kitty immediately. The vulnerability is triggered by a single APC graphics protocol command with a PNG format declaration (f=100) whose payload exceeds twice the initial buffer capacity. The overflow is attacker-controlled in both length and content, causing DoS and potentially escalation to RCE itself. This issue has been fixed in version 0.47.0.

Affected products

kitty
  • ==< 0.47.0

Matching in nixpkgs

pkgs.kitty

Fast, feature-rich, GPU based terminal emulator

Ignored packages (9)

Package maintainers