Bug 2186333 (CVE-2023-29581)
Summary: | CVE-2023-29581 yasm: segmentation violation in delete_Token() in modules/preprocs/nasm/nasm-pp.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | fjansen, nickc, sipoyare |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2186334, 2186335, 2186869, 2186870 | ||
Bug Blocks: | 2186336 |
Description
Pedro Sampaio
2023-04-12 21:23:43 UTC
Created yasm tracking bugs for this issue: Affects: epel-all [bug 2186335] Affects: fedora-all [bug 2186334] Why is this a security issue? Assemblers are not a service and shouldn't be required to accept untrusted input. As far as I can see, this CVE was not assigned by us, but by Mitre and since it was published, we have to file the bug nonetheless. Any requests to reject this CVE ID have to be directed to Mitre via cveform: https://cveform.mitre.org/ Thanks for the link, rejection request sent. |