Bug 1218978 (CVE-2023-51258)

Summary: VUL-0: CVE-2023-51258: yasm: memory leak issue allows a local attacker to cause a DoS
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED WONTFIX QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P5 - None CC: amajer, andrea.mattiazzo
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/391703/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-51258:2.8:(AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-01-19 08:43:23 UTC
A memory leak issue discovered in YASM v.1.3.0 allows a local attacker to cause a denial of service via the new_Token function in the modules/preprocs/nasm/nasm-pp:1512.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51258
https://www.cve.org/CVERecord?id=CVE-2023-51258
https://github.com/hanxuer/crashes/blob/main/yasm/04/readme.md
https://bugzilla.redhat.com/show_bug.cgi?id=2259116
https://github.com/yasm/yasm/issues/257
Comment 1 Andrea Mattiazzo 2024-01-19 08:44:53 UTC
Tracking as affected:
- SUSE:ALP:Source:Standard:1.0/yasm  1.3.0
- SUSE:SLE-12:Update/yasm            1.2.0
- SUSE:SLE-15:Update/yasm            1.3.0
- openSUSE:Factory/yasm              1.3.0

Closed as wontfix due to the nature of the bug and the context of yasm tool: an attacker could directly insert malicious code in the input file, there is no additional value gathered from exploiting the vulnerability creating an ad-hoc input file.