Source: kissfft Version: 131.1.0-3 Severity: important Tags: security upstream Forwarded: https://github.com/mborgerding/kissfft/issues/120 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for kissfft. CVE-2025-34297[0]: | KissFFT versions prior to the fix commit 1b083165 contain an integer | overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t | is 32-bit. The nfft parameter is not validated before being used in | a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can | wrap to a small value when nfft is large. As a result, malloc() | allocates an undersized buffer and the subsequent twiddle-factor | initialization loop writes nfft elements, causing a heap buffer | overflow. This vulnerability only affects 32-bit architectures. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-34297 https://www.cve.org/CVERecord?id=CVE-2025-34297 [1] https://github.com/mborgerding/kissfft/issues/120 [2] https://github.com/mborgerding/kissfft/commit/1b08316582049c3716154caefc0deab8758506e3 Regards, Salvatore

