Bug 2458086 - CVE-2026-6069 nasm: NASM: Arbitrary code execution via stack-based buffer overflow in `disasm()` [fedora-42]
Summary: CVE-2026-6069 nasm: NASM: Arbitrary code execution via stack-based buffer ove...
Keywords:
Status: CLOSED UPSTREAM
Alias: None
Product: Fedora
Classification: Fedora
Component: nasm
Version: 42
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Dominik 'Rathann' Mierzejewski
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["56e0e49c-eeb7-42a0-a8f3-7...
Depends On:
Blocks: CVE-2026-6069
TreeView+ depends on / blocked
 
Reported: 2026-04-14 00:14 UTC by Praise Ogwuche
Modified: 2026-04-15 19:46 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-04-15 19:46:07 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github netwide-assembler nasm issues 217 0 None open Stack-buffer-overflow in disasm() output formatting (disasm/disasm.c:1715, ASan reproducible) 2026-04-15 19:46:06 UTC

Description Praise Ogwuche 2026-04-14 00:14:52 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Dominik 'Rathann' Mierzejewski 2026-04-15 19:46:07 UTC
Not a security bug. See https://github.com/netwide-assembler/nasm/issues/217#issuecomment-4246347029 specifically.


Note You need to log in before you can comment on or make changes to this bug.