Debian Package Tracker
Register | Log in
Subscribe

binwalk

tool library for analyzing binary blobs and executable code

Choose email to subscribe with

general
  • source: binwalk (main)
  • version: 2.4.3+dfsg1-2
  • maintainer: Debian Security Tools (DMD)
  • uploaders: Gianfranco Costamagna [DMD]
  • arch: all
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.3.1+dfsg1-1
  • o-o-sec: 2.3.1+dfsg1-1+deb11u1
  • oldstable: 2.3.4+dfsg1-1
  • stable: 2.4.3+dfsg1-2
  • testing: 2.4.3+dfsg1-2
  • unstable: 2.4.3+dfsg1-2
versioned links
  • 2.3.1+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.3.1+dfsg1-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.3.4+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.3+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • binwalk (2 bugs: 0, 2, 0, 0)
  • python3-binwalk (1 bugs: 0, 1, 0, 0)
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-7179: A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.
Created: 2026-04-29 Last update: 2026-05-11 20:30
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-7179: A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.
Created: 2026-04-29 Last update: 2026-05-11 20:30
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2026-7179: A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.
Created: 2026-04-29 Last update: 2026-05-11 20:30
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-7179: (needs triaging) A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-29 Last update: 2026-05-11 20:30
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-7179: (needs triaging) A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-29 Last update: 2026-05-11 20:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.2).
Created: 2024-04-07 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2025-12-16] Accepted binwalk 2.3.1+dfsg1-1+deb11u1 (source all) into oldoldstable-security (Abhijith PA)
  • [2025-03-17] binwalk 2.4.3+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-14] Accepted binwalk 2.4.3+dfsg1-2 (source) into unstable (Sven Geuer)
  • [2024-11-10] binwalk 2.4.3+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-08] Accepted binwalk 2.4.3+dfsg1-1 (source) into unstable (Gianfranco Costamagna)
  • [2024-10-01] binwalk 2.4.2+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-29] Accepted binwalk 2.4.2+dfsg1-1 (source) into unstable (Alexandre Detiste)
  • [2024-03-29] binwalk 2.3.4+dfsg1-5 MIGRATED to testing (Debian testing watch)
  • [2024-03-27] Accepted binwalk 2.3.4+dfsg1-5 (source) into unstable (Gianfranco Costamagna)
  • [2024-02-21] binwalk 2.3.4+dfsg1-4 MIGRATED to testing (Debian testing watch)
  • [2024-02-19] Accepted binwalk 2.3.4+dfsg1-4 (source) into unstable (Gianfranco Costamagna)
  • [2024-02-13] binwalk 2.3.4+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2024-02-13] binwalk 2.3.4+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2024-02-09] Accepted binwalk 2.3.4+dfsg1-3 (source) into unstable (Gianfranco Costamagna)
  • [2024-02-08] Accepted binwalk 2.3.4+dfsg1-2 (source) into unstable (Gianfranco Costamagna)
  • [2023-02-23] Accepted binwalk 2.1.2~git20180830+dfsg1-1+deb10u1 (source) into oldstable (Adrian Bunk)
  • [2023-02-06] binwalk 2.3.4+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2023-02-04] Accepted binwalk 2.3.4+dfsg1-1 (source) into unstable (Gianfranco Costamagna)
  • [2022-02-03] binwalk 2.3.3+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2022-01-31] Accepted binwalk 2.3.3+dfsg1-2 (source) into unstable (Gianfranco Costamagna)
  • [2022-01-31] Accepted binwalk 2.3.3+dfsg1-1 (source) into unstable (Gianfranco Costamagna)
  • [2021-09-12] binwalk 2.3.2+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-10] Accepted binwalk 2.3.2+dfsg1-1 (source) into unstable (Gianfranco Costamagna)
  • [2021-04-17] binwalk 2.3.1+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2021-03-28] Accepted binwalk 2.3.1+dfsg1-1 (source) into unstable (Gianfranco Costamagna)
  • [2021-03-24] Accepted binwalk 2.3.0+dfsg1-2 (source) into unstable (Gianfranco Costamagna)
  • [2021-03-24] Accepted binwalk 2.3.0+dfsg1-1 (source) into unstable (Gianfranco Costamagna)
  • [2019-10-19] binwalk 2.2.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-17] Accepted binwalk 2.2.0+dfsg1-1 (source) into unstable (Gianfranco Costamagna)
  • [2018-09-02] binwalk 2.1.2~git20180830+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 4
  • RC: 0
  • I&N: 4
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.4.3+dfsg1-2build1
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing