Vulnerability Description
HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. In the `cram_decode_slice()` function called while reading CRAM records, the value of the mate reference id field was not validated. Later use of this value, for example when converting the data to SAM format, could result in the out of bounds array reads when looking up the corresponding reference name. If the array value obtained also happened to be a valid pointer, it would be interpreted as a string and an attempt would be made to write the data as part of the SAM record. This bug may allow information about program state to be leaked. It may also cause a program crash through an attempt to access invalid memory. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Htslib | Htslib | < 1.21.1 |
Related Weaknesses (CWE)
References
- https://github.com/samtools/htslib/commit/9cefb46453ad471e933b8212d4f45920524d33Patch
- https://github.com/samtools/htslib/security/advisories/GHSA-33x5-c6vj-8f2wPatchVendor Advisory
FAQ
What is CVE-2026-31967?
CVE-2026-31967 is a vulnerability with a CVSS score of 9.1 (CRITICAL). HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. In the `cram_decode_slice()` function called while readin...
How severe is CVE-2026-31967?
CVE-2026-31967 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-31967?
Check the references section above for vendor advisories and patch information. Affected products include: Htslib Htslib.