CVE-2026-35444 是 SDL_image 库中发现的一个安全漏洞,该漏洞允许攻击者通过构造恶意 XCF 文件导致堆溢出,从而可能泄露敏感信息。该漏洞影响版本 ≤ 996bf128 的库,已在 2.0.6 版本中修复。
An attacker can exploit this vulnerability by crafting a malicious XCF image file. When SDLimage attempts to decode this file, the out-of-bounds read allows the attacker to potentially leak up to 762 bytes of heap memory. This leaked data, written into the output surface pixel data, could be observable in the rendered image, potentially revealing sensitive information. While direct code execution is unlikely, the information disclosure could be a stepping stone for further attacks, particularly in applications that rely on SDLimage to display user-provided images. The impact is amplified in scenarios where the application processes untrusted image data without proper sanitization.
This CVE has been publicly disclosed. As of the current date, there are no known public exploits or active campaigns targeting this vulnerability. It is not currently listed on the CISA KEV catalog. The CVSS score of 7.1 (HIGH) indicates a significant potential for exploitation if an attacker gains access to a vulnerable system and can provide a malicious XCF file.
Applications and systems that utilize SDLimage to load and display images, particularly those processing user-uploaded or externally sourced XCF files, are at risk. This includes game development environments, multimedia applications, and any software relying on SDLimage for image rendering.
• linux / server:
ps aux | grep sdl_image• c / generic: Examine SDLimage source code (src/IMGxcf.c) for the dolayersurface() function and the validation of colormap indices.
• generic web: Monitor web server access logs for requests containing XCF files, especially those originating from untrusted sources.
disclosure
漏洞利用状态
EPSS
0.01% (3% 百分位)
CISA SSVC
The primary mitigation is to upgrade to SDL_image version 2.0.6 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing input validation to restrict the types of image files processed by the application. Specifically, validate the XCF file format and its contents before attempting to decode it. WAFs or proxies can be configured to block requests containing potentially malicious XCF files, although this is a less robust solution. Monitor application logs for unusual memory access patterns or errors related to image decoding, which could indicate exploitation attempts. After upgrading, confirm the fix by attempting to load a known malicious XCF file and verifying that the out-of-bounds read no longer occurs.
Actualice a la versión 2.0.6 o posterior para mitigar el desbordamiento del búfer de la pila. Esta actualización corrige la validación de los índices de la paleta de colores, evitando así el acceso fuera de los límites de la memoria.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2026-35444 是 SDL_image 库中发现的堆溢出漏洞。
如果您的 SDL_image 库版本小于或等于 996bf128,则可能受到影响。
升级到 SDL_image 2.0.6 或更高版本。
CVSS 向量