Bug 2035087 (CVE-2021-45257)

Summary: CVE-2021-45257 nasm: Infinite loop via the paste_tokens function
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: dominik, java-sig-commits, mizdebsk, nickc, pbonzini
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
An infinite loop flaw was found in nasm's preproc.c via paste_tokens() function. An attacker with local network access could pass a specially crafted unknown input causing an application to halt or crash leading to a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-01-11 12:23:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2035088, 2038121, 2038122    
Bug Blocks: 2035091    

Description Pedro Sampaio 2021-12-22 20:33:32 UTC
An infinite loop vulnerability exists in nasm 2.16rc0 via the gpaste_tokens function.

References:

https://bugzilla.nasm.us/show_bug.cgi?id=3392790

Comment 1 Pedro Sampaio 2021-12-22 20:33:46 UTC
Created nasm tracking bugs for this issue:

Affects: fedora-all [bug 2035088]