Bug 1877786 (CVE-2020-24978)

Summary: CVE-2020-24978 nasm: double-free vulnerability in pp_tokline asm/preproc.c
Product: [Other] Security Response Reporter: Michael Kaplan <mkaplan>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: mizdebsk, nickc
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-09-11 01:17:44 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1877787    

Description Michael Kaplan 2020-09-10 12:50:00 UTC
In NASM 2.15.04rc3, there is a double-free vulnerability in pp_tokline asm/preproc.c. This is fixed in commit 8806c3ca007b84accac21dd88b900fb03614ceb7.

References:

https://bugzilla.nasm.us/show_bug.cgi?id=3392712

Comment 2 Todd Cullum 2020-09-10 22:23:47 UTC
This would not reproduce for me on nasm 2.10.07 or 2.13.03. Upon further inspection of the source code pp_tokline does not exist in these versions yet, it seems it was introduced in commit a7afe276da2fba43fd906dbaad1497a2e0994693 tagged nasm-2.15rc1, which we do not ship.

Comment 3 Todd Cullum 2020-09-10 22:25:35 UTC
Statement:

This flaw does not affect nasm as shipped in Red Hat Enterprise Linux 7 or 8 as the vulnerable code was committed in a newer version of nasm.

Comment 4 Product Security DevOps Team 2020-09-11 01:17:44 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-24978