Name | CVE-2023-29581 |
Description | yasm 1.3.0.55.g101bc has a segmentation violation in the function delete_Token at modules/preprocs/nasm/nasm-pp.c. NOTE: although a libyasm application could become unavailable if this were exploited, the vendor's position is that there is no security relevance because there is either supposed to be input validation before data reaches libyasm, or a sandbox in which the application runs. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
yasm (PTS) | jessie | 1.2.0-2 | vulnerable |
| buster, stretch | 1.3.0-2 | vulnerable |
| bullseye | 1.3.0-2.1 | vulnerable |
| bookworm | 1.3.0-4 | vulnerable |
| sid, trixie | 1.3.0-5 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
yasm | source | (unstable) | (unfixed) | unimportant | | |
Notes
https://github.com/yasm/yasm/issues/216
Crash in CLI tool, no security impact