DescriptionIn Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by pp_getline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in delete_Token(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database||SUSE|
- SUSE-SU-2017:2044-1, published Fri Aug 4 13:08:32 MDT 2017
- SUSE-SU-2017:2045-1, published Fri Aug 4 13:09:04 MDT 2017
- openSUSE-SU-2017:2125-1, published Thu, 10 Aug 2017 03:12:36 +0200 (CEST)
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Linux Enterprise Software Development Kit 11 SP4|| ||Patchnames:
|SUSE Linux Enterprise Software Development Kit 12 SP2|| ||Patchnames:
|SUSE Linux Enterprise Software Development Kit 12 SP3|| ||Patchnames:
|openSUSE Leap 42.2|| ||Patchnames:
|openSUSE Leap 42.3|| ||Patchnames:
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise SDK 11 SP4||nasm||Released|
|SUSE Linux Enterprise SDK 12 SP2||nasm||Released|
|SUSE Linux Enterprise SDK 12 SP3||nasm||Released|