https://bugzilla.redhat.com/show_bug.cgi?id=1652041
Bug ID: 1652041 Summary: CVE-2018-19215 nasm: heap-based buffer over-read in expand_mmac_params in asm/preproc.c Product: Security Response Component: vulnerability Keywords: Security Severity: low Priority: low Assignee: security-response-team@redhat.com Reporter: lpardo@redhat.com CC: dominik@greysector.net, java-sig-commits@lists.fedoraproject.org, mizdebsk@redhat.com, nickc@redhat.com
A flaw was found in Netwide Assembler (NASM) 2.14rc16. A heap-based buffer over-read in expand_mmac_params in asm/preproc.c for the special cases of the % and $ and ! characters.
References: https://bugzilla.nasm.us/show_bug.cgi?id=3392525
Upstream Patch: https://repo.or.cz/nasm.git/commit/4b5b737d4991578b1918303dc0fd9c9ab5c7ce4f
https://bugzilla.redhat.com/show_bug.cgi?id=1652041
Laura Pardo lpardo@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1652042
--- Comment #1 from Laura Pardo lpardo@redhat.com --- Created nasm tracking bugs for this issue:
Affects: fedora-all [bug 1652042]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1652042 [Bug 1652042] CVE-2018-19215 nasm: heap-based buffer over-read in expand_mmac_params in asm/preproc.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1652041
Laura Pardo lpardo@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1652048
https://bugzilla.redhat.com/show_bug.cgi?id=1652041
Stefan Cornelius scorneli@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Summary|CVE-2018-19215 nasm: |CVE-2018-19215 nasm: |heap-based buffer over-read |heap-based buffer over-read |in expand_mmac_params in |in do_directive in |asm/preproc.c |asm/preproc.c Whiteboard|impact=low,public=20181029, |impact=low,public=20181029, |reported=20181112,source=cv |reported=20181112,source=cv |e,cvss3=3.3/CVSS:3.0/AV:L/A |e,cvss3=3.3/CVSS:3.0/AV:L/A |C:L/PR:N/UI:R/S:U/C:N/I:N/A |C:L/PR:N/UI:R/S:U/C:N/I:N/A |:L,cwe=CWE-125,fedora-all/n |:L,cwe=CWE-125,fedora-all/n |asm=affected,rhel-5/nasm=ne |asm=affected,rhel-5/nasm=wo |w,rhel-7/nasm=new,rhel-8/na |ntfix,rhel-7/nasm=affected, |sm=new,rhel-6/nasm=new |rhel-8/nasm=affected,rhel-6 | |/nasm=wontfix
https://bugzilla.redhat.com/show_bug.cgi?id=1652041
--- Comment #3 from Stefan Cornelius scorneli@redhat.com --- Statement:
This issue affects the versions of nasm as shipped with Red Hat Enterprise Linux 5, 6, and 7.
Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
https://bugzilla.redhat.com/show_bug.cgi?id=1652041
Stefan Cornelius scorneli@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1652948, 1652949
java-sig-commits@lists.fedoraproject.org