CVE-2023-30402

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30402
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30402.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30402
Withdrawn
2024-05-10T16:23:58Z
Published
2023-04-25T16:15:09Z
Modified
2025-01-14T11:41:12.473972Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

YASM v1.3.0 was discovered to contain a heap overflow via the function handledotlabel at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.

References

Affected packages

Debian:11 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-2.1
1.3.0-2.2
1.3.0-3
1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Git / github.com/yasm/yasm

Affected ranges

Type
GIT
Repo
https://github.com/yasm/yasm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.1.0

v1.*

v1.2.0
v1.3.0