dr_libs dr_wav.h version 0.14.4 and earlier (fixed in commit 8a7258c) contain a heap buffer overflow vulnerability in the drwav__read_smpl_to_metadata_obj() function of dr_wav.h that allows memory corruption via crafted WAV files. Attackers can exploit a mismatch between sampleLoopCount validation in pass 1 and unconditional processing in pass 2 to overflow heap allocations with 36 bytes of attacker-controlled data through any drwav_init_*_with_metadata() call on untrusted input.
References
| Link | Resource |
|---|---|
| https://github.com/mackron/dr_libs/commit/8a7258cc66b49387ad58cc5b81568982a3560d49 | Patch |
| https://github.com/mackron/dr_libs/issues/296 | Exploit Issue Tracking Patch Third Party Advisory |
| https://github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2026-001-dr-libs-heap-overflow.md | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/mackron-dr-libs-heap-buffer-overflow-via-wav-file | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-03-03 20:16
Updated : 2026-03-20 18:16
NVD link : CVE-2026-29022
Mitre link : CVE-2026-29022
CVE.ORG link : CVE-2026-29022
JSON object : View
Products Affected
mackron
- dr_libs
