Bug 2435372 (CVE-2026-25068) - CVE-2026-25068 alsa-lib: alsa-lib Topology Decoder Heap-based Buffer Overflow
Summary: CVE-2026-25068 alsa-lib: alsa-lib Topology Decoder Heap-based Buffer Overflow
Keywords:
Status: NEW
Alias: CVE-2026-25068
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2435422 2435423
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-29 20:01 UTC by OSIDB Bzimport
Modified: 2026-01-29 22:34 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-29 20:01:43 UTC
alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to commit 5f7fe33, contain a heap-based buffer overflow in the topology mixer control decoder. The tplg_decode_control_mixer1() function reads the num_channels field from untrusted .tplg data and uses it as a loop bound without validating it against the fixed-size channel array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive num_channels value can cause out-of-bounds heap writes, leading to a crash.


Note You need to log in before you can comment on or make changes to this bug.