Debian Capnproto vulnerabilities
9 known vulnerabilities affecting debian/capnproto.
Total CVEs
9
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH2MEDIUM3LOW2
Vulnerabilities
Page 1 of 1
CVE-2026-32240MEDIUMCVSS 6.3fixed in capnproto 1.4.0-2 (forky)2026
CVE-2026-32240 [MEDIUM] CVE-2026-32240: capnproto - Cap'n Proto is a data interchange format and capability-based RPC system. Prior ...
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
Scope: local
bookworm: open
bulls
debian
CVE-2026-32239MEDIUMCVSS 6.3fixed in capnproto 1.4.0-2 (forky)2026
CVE-2026-32239 [MEDIUM] CVE-2026-32239: capnproto - Cap'n Proto is a data interchange format and capability-based RPC system. Prior ...
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
Scope: local
bookworm: open
bullseye: open
forky: resolved (
debian
CVE-2023-48230LOWCVSS 5.9fixed in capnproto 1.0.1-3 (forky)2023
CVE-2023-48230 [MEDIUM] CVE-2023-48230: capnproto - Cap'n Proto is a data interchange format and capability-based RPC system. In ver...
Cap'n Proto is a data interchange format and capability-based RPC system. In versions 1.0 and 1.0.1, when using the KJ HTTP library with WebSocket compression enabled, a buffer underrun can be caused by a remote peer. The underrun always writes a constant value that is not attacker-controlled, likely resulting in a crash, enabling a remote denial-of-service atta
debian
CVE-2022-46149MEDIUMCVSS 5.4fixed in capnproto 0.9.2-2 (bookworm)2022
CVE-2022-46149 [MEDIUM] CVE-2022-46149: capnproto - Cap'n Proto is a data interchange format and remote procedure call (RPC) system....
Cap'n Proto is a data interchange format and remote procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerable to out-of-bounds read due to logic error handling list-of-list. This issue may lead someone to remotely segfaul
debian
CVE-2017-7892LOWCVSS 7.5fixed in capnproto 0.6.1-1 (bookworm)2017
CVE-2017-7892 [HIGH] CVE-2017-7892: capnproto - Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a compiler...
Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a compiler optimization. A remote attacker can trigger a segfault in a 32-bit libcapnp application because Cap'n Proto relies on pointer arithmetic calculations that overflow. An example compiler with optimization that elides a bounds check in such calculations is Apple LLVM version 8.1.0 (clang-8
debian
CVE-2015-2310CRITICALCVSS 9.1fixed in capnproto 0.4.1-3 (bookworm)2015
CVE-2015-2310 [CRITICAL] CVE-2015-2310: capnproto - Integer overflow in layout.c++ in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x...
Integer overflow in layout.c++ in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service or possibly obtain sensitive information from memory via a crafted message, related to pointer validation.
Scope: local
bookworm: resolved (fixed in 0.4.1-3)
bullseye: resolved (fixed in 0.4.1-3)
forky: resolved (fixed
debian
CVE-2015-2311CRITICALCVSS 9.8fixed in capnproto 0.4.1-3 (bookworm)2015
CVE-2015-2311 [CRITICAL] CVE-2015-2311: capnproto - Integer underflow in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1...
Integer underflow in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 might allow remote peers to cause a denial of service or possibly obtain sensitive information from memory or execute arbitrary code via a crafted message.
Scope: local
bookworm: resolved (fixed in 0.4.1-3)
bullseye: resolved (fixed in 0.4.1-3)
forky: resolved (fixed in 0.4.1-3)
s
debian
CVE-2015-2313HIGHCVSS 7.5fixed in capnproto 0.4.1-3 (bookworm)2015
CVE-2015-2313 [HIGH] CVE-2015-2313: capnproto - Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an applicati...
Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an application invokes the totalSize method on an object reader, allows remote peers to cause a denial of service (CPU consumption) via a crafted small message, which triggers a "tight" for loop. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-2312.
Scope: local
bookworm: r
debian
CVE-2015-2312HIGHCVSS 7.5fixed in capnproto 0.4.1-3 (bookworm)2015
CVE-2015-2312 [HIGH] CVE-2015-2312: capnproto - Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peer...
Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service (CPU and possibly general resource consumption) via a list with a large number of elements.
Scope: local
bookworm: resolved (fixed in 0.4.1-3)
bullseye: resolved (fixed in 0.4.1-3)
forky: resolved (fixed in 0.4.1-3)
sid: resolved (fixed in 0.4.1-3)
trixie:
debian