Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kissfft Project
Kissfft Project kissfft |
|
| Vendors & Products |
Kissfft Project
Kissfft Project kissfft |
Mon, 01 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures. | |
| Title | KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T15:43:50.817Z
Reserved: 2025-04-15T19:15:22.582Z
Link: CVE-2025-34297
Updated: 2025-12-01T18:37:22.872Z
Status : Deferred
Published: 2025-12-01T19:15:50.420
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34297
No data.
OpenCVE Enrichment
Updated: 2025-12-02T12:15:19Z