Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Htslib
Htslib htslib |
|
| CPEs | cpe:2.3:a:htslib:htslib:*:*:*:*:*:*:*:* cpe:2.3:a:htslib:htslib:1.23:*:*:*:*:*:*:* |
|
| Vendors & Products |
Htslib
Htslib htslib |
|
| Metrics |
cvssV3_1
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samtools
Samtools htslib |
|
| Vendors & Products |
Samtools
Samtools htslib |
Wed, 18 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. When reading data encoded using the `BYTE_ARRAY_LEN` method, the `cram_byte_array_len_decode()` failed to validate that the amount of data being unpacked matched the size of the output buffer where it was to be stored. Depending on the data series being read, this could result either in a heap or a stack overflow with attacker-controlled bytes. Depending on the data stream this could result either in a heap buffer overflow or a stack overflow. If a user opens a file crafted to exploit this issue it could lead to the program crashing, overwriting of data structures on the heap or stack in ways not expected by the program, or changing the control flow of the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. | |
| Title | HTSlib CRAM decoder vulnerable to buffer overflow | |
| Weaknesses | CWE-121 CWE-122 CWE-1284 CWE-787 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-18T20:15:22.414Z
Reserved: 2026-03-10T15:40:10.486Z
Link: CVE-2026-31971
Updated: 2026-03-18T20:15:14.940Z
Status : Analyzed
Published: 2026-03-18T20:16:22.243
Modified: 2026-03-19T13:58:31.573
Link: CVE-2026-31971
No data.
OpenCVE Enrichment
Updated: 2026-03-19T08:55:36Z