CVE-2025-34297

NameCVE-2025-34297
DescriptionKissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1131147

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kissfft (PTS)bullseye131.1.0-1vulnerable
bookworm, trixie131.1.0-3vulnerable
forky, sid131.1.0-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kissfftsource(unstable)(unfixed)1131147

Notes

https://github.com/mborgerding/kissfft/issues/120
Fixed by: https://github.com/mborgerding/kissfft/commit/1b08316582049c3716154caefc0deab8758506e3

Search for package or bug name: Reporting problems