Source: alsa-lib Version: 1.2.15.3-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for alsa-lib. CVE-2026-25068[0]: | alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to | commit 5f7fe33, contain a heap-based buffer overflow in the topology | mixer control decoder. The tplg_decode_control_mixer1() function | reads the num_channels field from untrusted .tplg data and uses it | as a loop bound without validating it against the fixed-size channel | array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive | num_channels value can cause out-of-bounds heap writes, leading to a | crash. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-25068 https://www.cve.org/CVERecord?id=CVE-2026-25068 [1] https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

