-
CVSS Score
-The vulnerability documentation and patch explicitly reference cs_winkernel_malloc in winkernel_mm.c as the affected function. The pre-patch code lacked overflow validation for the memory allocation size calculation (size + header size). The commit diff shows the vulnerability was fixed by adding RtlSizeTAdd() to safely check the arithmetic operation. All sources (CVE, GHSA, patch details) consistently identify this single function as the vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| capstone | pip | < 3.0.5rc2 | 3.0.5rc2 |
A Semantic Attack on Google Gemini - Read the Latest Research