Bug 2457289 (CVE-2026-6067)

Summary: CVE-2026-6067 nasm: Netwide Assembler (NASM): Arbitrary code execution via malicious assembly file processing
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerability-draftAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Netwide Assembler (NASM). This heap buffer overflow vulnerability, stemming from insufficient bounds checking, allows a user to execute arbitrary code by assembling a specially crafted malicious assembly (.asm) file. Successful exploitation can lead to unauthorized command execution, heap memory corruption, and denial of service, potentially causing system instability or crashes.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2458087, 2458089    
Bug Blocks:    

Description OSIDB Bzimport 2026-04-10 14:01:34 UTC
A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to heap memory corruption, denial of service (crash), and arbitrary code execution.

Comment 3 Dominik 'Rathann' Mierzejewski 2026-04-22 20:55:10 UTC
CVSS score at NVD is wrong, should be 5.5 medium. (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)