https://bugzilla.redhat.com/show_bug.cgi?id=1790845
Bug ID: 1790845 Summary: CVE-2019-20352 nasm: heap-based buffer over-read in set_text_free when called from expand_one_smacro in asm/preproc.c Product: Security Response Hardware: All OS: Linux Status: NEW Component: vulnerability Keywords: Security Severity: high Priority: high Assignee: security-response-team@redhat.com Reporter: mrehak@redhat.com CC: dominik@greysector.net, fdc@fcami.net, i.gnatenko.brain@gmail.com, java-sig-commits@lists.fedoraproject.org, mizdebsk@redhat.com, nickc@redhat.com, pbonzini@redhat.com Target Milestone: --- Classification: Other
In Netwide Assembler (NASM) 2.15rc0, a heap-based buffer over-read occurs (via a crafted .asm file) in set_text_free when called from expand_one_smacro in asm/preproc.c.
Upstream Issue:
https://bugzilla.nasm.us/show_bug.cgi?id=3392636
https://bugzilla.redhat.com/show_bug.cgi?id=1790845
Marian Rehak mrehak@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1790847
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1790847 [Bug 1790847] CVE-2019-20352 nasm: heap-based buffer over-read in set_text_free when called from expand_one_smacro in asm/preproc.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1790845
--- Comment #1 from Marian Rehak mrehak@redhat.com --- Created nasm tracking bugs for this issue:
Affects: fedora-all [bug 1790847]
https://bugzilla.redhat.com/show_bug.cgi?id=1790845
Marian Rehak mrehak@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1790868
https://bugzilla.redhat.com/show_bug.cgi?id=1790845
Huzaifa S. Sidhpurwala huzaifas@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Priority|high |low Severity|high |low
--- Comment #2 from Huzaifa S. Sidhpurwala huzaifas@redhat.com --- Nasm is an assembler/disassembler for Intel x86 architecture. This flaw can be triggered when nasm is used to assemble a malicious assembly instructions file. These operations are usually done by developers or users have local shell accounts. Also since this is an OOB read flaw, it can only cause a crash.
https://bugzilla.redhat.com/show_bug.cgi?id=1790845
Huzaifa S. Sidhpurwala huzaifas@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1791605, 1791606
https://bugzilla.redhat.com/show_bug.cgi?id=1790845 Bug 1790845 depends on bug 1790847, which changed state.
Bug 1790847 Summary: CVE-2019-20352 nasm: heap-based buffer over-read in set_text_free when called from expand_one_smacro in asm/preproc.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1790847
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |EOL
java-sig-commits@lists.fedoraproject.org