Bug 2448775 (CVE-2026-31967) - CVE-2026-31967 htslib: HTSlib: Information disclosure and Denial of Service via unvalidated CRAM mate reference ID
Summary: CVE-2026-31967 htslib: HTSlib: Information disclosure and Denial of Service v...
Keywords:
Status: NEW
Alias: CVE-2026-31967
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2448877 2448887 2448890 2448891 2448881
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-18 20:02 UTC by OSIDB Bzimport
Modified: 2026-03-18 21:36 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-18 20:02:12 UTC
HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. In the `cram_decode_slice()` function called while reading CRAM records, the value of the mate reference id field was not validated. Later use of this value, for example when converting the data to SAM format, could result in the out of bounds array reads when looking up the corresponding reference name. If the array value obtained also happened to be a valid pointer, it would be interpreted as a string and an attempt would be made to write the data as part of the SAM record. This bug may allow information about program state to be leaked. It may also cause a program crash through an attempt to access invalid memory. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue.


Note You need to log in before you can comment on or make changes to this bug.