Description
KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr.c where the allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit integer arithmetic before being widened to size_t, causing malloc() to allocate an undersized buffer. Attackers can trigger heap buffer overflow by providing crafted dimensions that cause the multiplication to exceed INT_MAX, allowing writes beyond the allocated buffer region when kiss_fftndr() processes the data.
Published: 2026-04-20
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an integer overflow in the calculation of the allocation size for the FFT buffer in the kiss_fftndr_alloc() function. By providing crafted dimension values, the multiplication dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) exceeds the maximum value for a signed 32‑bit integer, causing malloc() to allocate a buffer that is too small. During subsequent processing of the FFT data, writes beyond the end of this underestimated buffer can corrupt memory and lead to arbitrary code execution. This flaw is a classic instance of a heap‑based buffer overflow (CWE‑122) triggered by an unchecked integer overflow (CWE‑190).

Affected Systems

Any installation of the KissFFT library that predates commit 8a8e66e33d692bad1376fe7904d87d767730537f is affected. The vulnerability exists in the core library regardless of distribution channel, so all users and applications that link against an unpatched version of KissFFT, including those embedded in larger multimedia or signal‑processing software, must be evaluated for exposure.

Risk and Exploitability

The CVSS base score of 8.7 indicates a high severity risk. Although the EPSS score is not available, the lack of a KEV listing does not diminish the potential for exploitation. Attackers who can influence the input dimensions to kiss_fftndr_alloc()—for example, via a network‑exposed API or malformed file—can trigger the overflow. The exploitation path requires that the application uses the unpatched library during runtime, making local or remote attacks possible depending on the deployment context. Consequently, the vulnerability poses a significant threat that warrants immediate remediation.

Generated by OpenCVE AI on April 20, 2026 at 18:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the KissFFT library to a version that includes commit 8a8e66e33d692bad1376fe7904d87d767730537f or later, which corrects the integer and buffer overflow.
  • In the interim, add bounds checking on the dimensions passed to kiss_fftndr_alloc(), ensuring that dimOther*(dimReal+2) does not exceed INT_MAX and rejecting or sanitizing inputs that would trigger an overflow.
  • Compile the library and any dependent applications with run‑time bounds‑checking options such as ‑fstack‑protector and ‑D_FORTIFY_SOURCE to provide additional heap overflow protection while a proper library update is rolled out.

Generated by OpenCVE AI on April 20, 2026 at 18:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr.c where the allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit integer arithmetic before being widened to size_t, causing malloc() to allocate an undersized buffer. Attackers can trigger heap buffer overflow by providing crafted dimensions that cause the multiplication to exceed INT_MAX, allowing writes beyond the allocated buffer region when kiss_fftndr() processes the data.
Title KissFFT Integer Overflow Heap Buffer Overflow via kiss_fftndr_alloc()
Weaknesses CWE-122
CWE-190
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-20T17:57:10.156Z

Reserved: 2026-04-20T16:07:47.308Z

Link: CVE-2026-41445

cve-icon Vulnrichment

Updated: 2026-04-20T17:55:37.590Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T17:16:37.160

Modified: 2026-04-20T19:05:30.750

Link: CVE-2026-41445

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T18:45:14Z

Weaknesses