Debian Capstone vulnerabilities
4 known vulnerabilities affecting debian/capstone.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM2LOW2
Vulnerabilities
Page 1 of 1
CVE-2025-68114MEDIUMCVSS 4.8fixed in capstone 5.0.7-1 (forky)2025
CVE-2025-68114 [MEDIUM] CVE-2025-68114: capstone - Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unch...
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unchecked vsnprintf return in SStream_concat lets a malicious cs_opt_mem.vsnprintf drive SStream’s index negative or past the end, leading to a stack buffer underflow/overflow when the next write occurs. Commit 2c7797182a1618be12017d7d41e0b6581d5d529e fixes the issue.
Scope: local
bookwor
debian
CVE-2025-67873MEDIUMCVSS 4.8fixed in capstone 5.0.7-1 (forky)2025
CVE-2025-67873 [MEDIUM] CVE-2025-67873: capstone - Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdat...
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit cbef767ab33b82166d263895f24084b75b316df3 fixes the issue.
Scope: local
bo
debian
CVE-2017-6952LOWCVSS 8.82017
CVE-2017-6952 [HIGH] CVE-2017-6952: capstone - Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capsto...
Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 and earlier allows attackers to cause a denial of service (heap-based buffer overflow in a kernel driver) or possibly have unspecified other impact via a large value.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2016-7151LOWCVSS 5.5fixed in capstone 4.0.2-2 (bookworm)2016
CVE-2016-7151 [MEDIUM] CVE-2016-7151: capstone - Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory ...
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c.
Scope: local
bookworm: resolved (fixed in 4.0.2-2)
bullseye: resolved (fixed in 4.0.2-2)
forky: resolved (fixed in 4.0.2-2)
sid: resolved (fixed in 4.0.2-2)
trixie: resolved (fixed in 4.0.2-2)
debian