Bug 1218516 (CVE-2023-49554) - VUL-0: CVE-2023-49554: yasm: use-after-free vulnerability via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component.
Summary: VUL-0: CVE-2023-49554: yasm: use-after-free vulnerability via the do_directiv...
Status: RESOLVED WONTFIX
Alias: CVE-2023-49554
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Adam Majer
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/389895/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-49554:5.0:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-03 15:53 UTC by SMASH SMASH
Modified: 2024-01-04 11:04 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-01-03 15:53:15 UTC
Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-49554
https://github.com/yasm/yasm/issues/249
Comment 3 Andrea Mattiazzo 2024-01-04 10:14:59 UTC
As agreed, closed as wontfix
Comment 4 Andrea Mattiazzo 2024-01-04 11:04:06 UTC
Just to add more info, closed as wontfix due to the context of yasm tool: an attacker could directly insert malicious code in the input file, there is no additional value gathered from exploiting the vulnerability creating an ad-hoc input file.