Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unchecked vsnprintf return in SStreamconcat lets a malicious csopt_mem.vsnprintf drive SStream’s index negative or past the end, leading to a stack buffer underflow/overflow when the next write occurs. Commit 2c7797182a1618be12017d7d41e0b6581d5d529e fixes the issue.
{
"cwe_ids": [
"CWE-120",
"CWE-124"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68114.json",
"cna_assigner": "GitHub_M"
}[
{
"id": "CVE-2025-68114-4a039f54",
"target": {
"file": "tests/unit/include/unit_test.h"
},
"digest": {
"line_hashes": [
"38183512480943367621915465734839263480",
"179056925853330904306037807417288304673",
"156955737411414667375753507208202176786",
"35542490554786979523313654169079774015"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"source": "https://github.com/capstone-engine/capstone/commit/2c7797182a1618be12017d7d41e0b6581d5d529e"
},
{
"id": "CVE-2025-68114-5b6fd1e1",
"target": {
"file": "SStream.h"
},
"digest": {
"line_hashes": [
"104799443181680666571220090827433126101",
"145749487541825035222504241676669124560",
"272480164307369866905527421015921909006",
"232719784416819949372085967004347915752"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"source": "https://github.com/capstone-engine/capstone/commit/2c7797182a1618be12017d7d41e0b6581d5d529e"
},
{
"id": "CVE-2025-68114-b6529f60",
"target": {
"file": "tests/unit/sstream.c"
},
"digest": {
"line_hashes": [
"26580799822513680810900071855432266443",
"272491423694404427872882383680314605773",
"122546753726241026889451074095444852957",
"7451917664364825780596204956858144685",
"193528195158813550690072624422728662671",
"23233932794032932727549210811757876274",
"278501653130094257636890085876297442158"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"source": "https://github.com/capstone-engine/capstone/commit/2c7797182a1618be12017d7d41e0b6581d5d529e"
},
{
"id": "CVE-2025-68114-c0484747",
"target": {
"file": "SStream.c",
"function": "SStream_concat"
},
"digest": {
"length": 568.0,
"function_hash": "200822371892265313599121659825426363866"
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"source": "https://github.com/capstone-engine/capstone/commit/2c7797182a1618be12017d7d41e0b6581d5d529e"
},
{
"id": "CVE-2025-68114-c72022e8",
"target": {
"file": "tests/unit/sstream.c",
"function": "main"
},
"digest": {
"length": 537.0,
"function_hash": "276332624018350905365492612971771323355"
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"source": "https://github.com/capstone-engine/capstone/commit/2c7797182a1618be12017d7d41e0b6581d5d529e"
},
{
"id": "CVE-2025-68114-f8076c96",
"target": {
"file": "SStream.c"
},
"digest": {
"line_hashes": [
"186233073925322802491837053965931420149",
"332968745551372891548853607419313225041",
"208872343785869807590490152485531481876",
"112234655490822411310640889670600863614"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"source": "https://github.com/capstone-engine/capstone/commit/2c7797182a1618be12017d7d41e0b6581d5d529e"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68114.json"