https://bugzilla.redhat.com/show_bug.cgi?id=1652033
Bug ID: 1652033 Summary: CVE-2018-19214 nasm: heap-based buffer over-read in expand_mmac_params in asm/preproc.c Product: Security Response Component: vulnerability Keywords: Security Severity: low Priority: low Assignee: security-response-team@redhat.com Reporter: lpardo@redhat.com CC: dominik@greysector.net, java-sig-commits@lists.fedoraproject.org, mizdebsk@redhat.com, nickc@redhat.com
A flaw was found in Netwide Assembler (NASM) 2.14rc15. A heap-based buffer over-read in expand_mmac_params in asm/preproc.c for insufficient input.
References: https://bugzilla.nasm.us/show_bug.cgi?id=3392521
Upstream Patch: https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354
https://bugzilla.redhat.com/show_bug.cgi?id=1652033
Laura Pardo lpardo@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1652034
--- Comment #1 from Laura Pardo lpardo@redhat.com --- Created nasm tracking bugs for this issue:
Affects: fedora-all [bug 1652034]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1652034 [Bug 1652034] CVE-2018-19214 nasm: heap-based buffer over-read in expand_mmac_params in asm/preproc.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1652033
Laura Pardo lpardo@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1652048
https://bugzilla.redhat.com/show_bug.cgi?id=1652033
Stefan Cornelius scorneli@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|impact=low,public=20181028, |impact=low,public=20181028, |reported=20181112,source=cv |reported=20181112,source=cv |e,cvss3=3.3/CVSS:3.0/AV:L/A |e,cvss3=3.3/CVSS:3.0/AV:L/A |C:L/PR:N/UI:R/S:U/C:N/I:N/A |C:L/PR:N/UI:R/S:U/C:N/I:N/A |:L,cwe=CWE-125,fedora-all/n |:L,cwe=CWE-125,fedora-all/n |asm=affected,rhel-5/nasm=ne |asm=affected,rhel-5/nasm=wo |w,rhel-7/nasm=new,rhel-8/na |ntfix,rhel-7/nasm=affected, |sm=new,rhel-6/nasm=new |rhel-8/nasm=affected,rhel-6 | |/nasm=wontfix
--- Comment #2 from Stefan Cornelius scorneli@redhat.com --- Reproducer also triggers the issue covered in bug 1478913.
https://bugzilla.redhat.com/show_bug.cgi?id=1652033
--- Comment #3 from Stefan Cornelius scorneli@redhat.com --- Statement:
This issue affects the versions of nasm as shipped with Red Hat Enterprise Linux 5, 6, and 7.
Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
https://bugzilla.redhat.com/show_bug.cgi?id=1652033
Stefan Cornelius scorneli@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1652950, 1652947
java-sig-commits@lists.fedoraproject.org