CVE-2026-40494
SAIL has heap buffer overflow in TGA RLE decoder โ raw packet path missing bounds check
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. Prior to commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302, the TGA codec's RLE decoder in `tga.c` has an asymmetric bounds check vulnerability. The run-packet path (line 297) correctly clamps the repeat count to the remaining buffer space, but the raw-packet path (line 305-311) has no equivalent bounds check. This allows writing up to 496 bytes of attacker-controlled data past the end of a heap buffer. Commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302 patches the issue.
| CWE | CWE-787 |
| Vendor | happyseafox |
| Product | sail |
| Published | Apr 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for happyseafox sail
Be the first to know when new critical vulnerabilities affecting happyseafox sail are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
HappySeaFox / sail
< 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302