Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Mar 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sail
Sail sail |
|
| CPEs | cpe:2.3:a:sail:sail:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sail
Sail sail |
Wed, 25 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Happyseafox
Happyseafox sail |
|
| Vendors & Products |
Happyseafox
Happyseafox sail |
Fri, 20 Feb 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can provide an XWD file with an arbitrarily large bytes_per_line, causing a massive write operation beyond the buffer heap allocated for the image pixels. The issue did not have a fix at the time of publication. | |
| Title | SAIL: Heap-based Buffer Overflow in Sail-codecs-xwd | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T21:27:45.488Z
Reserved: 2026-02-18T00:18:53.963Z
Link: CVE-2026-27168
Updated: 2026-02-25T21:27:40.748Z
Status : Analyzed
Published: 2026-02-21T00:16:16.640
Modified: 2026-03-02T13:28:55.607
Link: CVE-2026-27168
No data.
OpenCVE Enrichment
Updated: 2026-04-17T17:00:10Z