[ALSA-2026:6817] Important: capstone security update
Type:
security
Severity:
important
Release date:
2026-04-15
Description:
Capstone is a disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community. Security Fix(es): * capstone: Capstone: Memory corruption via unchecked vsnprintf return (CVE-2025-68114) * capstone: Capstone: Heap buffer overflow via skipdata callback allows denial of service or arbitrary code execution. (CVE-2025-67873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 capstone-5.0.1-7.el10_1.aarch64.rpm 1e6c36725b6b5f1112348b17c9737626fb3074c5878a7769d18e91a07253a2fc
aarch64 capstone-devel-5.0.1-7.el10_1.aarch64.rpm 60cabf1265bc6a2dec6795b3da38c9a1cfb1b95fc6e72320492244401c258448
noarch capstone-java-5.0.1-7.el10_1.noarch.rpm 36251294e35a6e0b2ef616b0cf22e06128bc4128fe6a420826479315ae81cd62
noarch python3-capstone-5.0.1-7.el10_1.noarch.rpm daba3469816d9404c9f5c2942c47365e3484d67ef717e1142b0e4f14ab75451e
ppc64le capstone-5.0.1-7.el10_1.ppc64le.rpm bf62ef1f28770caf1dd4aceb014fcf1ea11857908e4a36553ce36a4361709e39
ppc64le capstone-devel-5.0.1-7.el10_1.ppc64le.rpm ca13e3927b2851aaf0fb25975d13130069367fff058308a4904011886a5c1342
s390x capstone-devel-5.0.1-7.el10_1.s390x.rpm 31693395256a92e7df2c51126700382cdec69f90cbba5a752decc336a04640ca
s390x capstone-5.0.1-7.el10_1.s390x.rpm 7f4cd886391fa79eae24cdb57901fc88828d012c753381696af3e2d0fd3c5116
x86_64 capstone-devel-5.0.1-7.el10_1.x86_64.rpm 9f6e7dab9e93c76714313bc42ca8a931ff41b21060f89c96a1980cf13c4131d1
x86_64 capstone-5.0.1-7.el10_1.x86_64.rpm c9ab81c5a179f09ec6cf944061f0211fb10ff7319febb665ad84536531354673
x86_64_v2 capstone-devel-5.0.1-7.el10_1.x86_64_v2.rpm 3ea929d84c64e037f556927827d0b899c6d0b47b548dc9c471fa9a2339a0d940
x86_64_v2 capstone-5.0.1-7.el10_1.x86_64_v2.rpm 4a789720bed38ad7fac458648b8960be11adf333e9c7da410c4fb37a76fa597b
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.