Source: alsa-lib
Version: 1.2.15.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for alsa-lib.

CVE-2026-25068[0]:
| alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to
| commit 5f7fe33, contain a heap-based buffer overflow in the topology
| mixer control decoder. The tplg_decode_control_mixer1() function
| reads the num_channels field from untrusted .tplg data and uses it
| as a loop bound without validating it against the fixed-size channel
| array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive
| num_channels value can cause out-of-bounds heap writes, leading to a
| crash.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-25068
    https://www.cve.org/CVERecord?id=CVE-2026-25068
[1] 
https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to