Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4q9h-j8g6-f49h

Опубликовано: 01 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.6

Описание

KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.

KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.

EPSS

Процентиль: 4%
0.00018
Низкий

8.6 High

CVSS4

Дефекты

CWE-190

Связанные уязвимости

nvd
2 месяца назад

KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.

msrc
2 месяца назад

KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc

EPSS

Процентиль: 4%
0.00018
Низкий

8.6 High

CVSS4

Дефекты

CWE-190