Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 18 Apr 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Happyseafox
Happyseafox sail |
|
| Vendors & Products |
Happyseafox
Happyseafox sail |
Sat, 18 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. Prior to commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302, the TGA codec's RLE decoder in `tga.c` has an asymmetric bounds check vulnerability. The run-packet path (line 297) correctly clamps the repeat count to the remaining buffer space, but the raw-packet path (line 305-311) has no equivalent bounds check. This allows writing up to 496 bytes of attacker-controlled data past the end of a heap buffer. Commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302 patches the issue. | |
| Title | SAIL has heap buffer overflow in TGA RLE decoder — raw packet path missing bounds check | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T14:55:42.859Z
Reserved: 2026-04-13T19:50:42.115Z
Link: CVE-2026-40494
Updated: 2026-04-20T14:47:40.310Z
Status : Deferred
Published: 2026-04-18T03:16:13.590
Modified: 2026-04-20T18:55:47.120
Link: CVE-2026-40494
No data.
OpenCVE Enrichment
Updated: 2026-04-18T08:45:41Z