|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-38665: nasm: Null pointer dereference in ieee_write_file | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Alexander Bergmann <abergmann> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Minor | ||
| Priority: | P3 - Medium | CC: | abergmann, amajer, carlos.lopez, mvetter, security-team, stoyan.manolov |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/376104/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-38665:3.3:(AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | Reproducer | ||
|
Description
Alexander Bergmann
2023-08-23 07:08:03 UTC
Created attachment 868959 [details]
Reproducer
# nasm -f ieee poc_nasm
poc_nasm:1: warning: label alone on a line without a colon might be in error [-w+label-orphan]
Segmentation fault (core dumped)
Note: Do not trust data from unknown sources. Do not assemble code from unknown sources without a sandbox environment that protects you from possible attacks. In general: This is not a severe issue. It can only exploited if general security measurements and best practices are not followed. For now, we will keep this bug open for reference. Current status: - Segmentation fault can be reproduced. - No upstream fix available. Closing as WONTFIX, as discussed above. |