CVE-2023-29582

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-29582
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-29582.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-29582
Withdrawn
2024-05-10T16:20:58Z
Published
2023-04-24T13:15:07Z
Modified
2025-01-14T11:40:30.087605Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr1 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.

References

Affected packages

Debian:11 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-2.1
1.3.0-2.2
1.3.0-3
1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}