CVE-2023-31972

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-31972
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-31972.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-31972
Withdrawn
2024-05-16T21:39:12Z
Published
2023-05-09T13:15:18Z
Modified
2025-01-29T21:46:03.832303Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.

References

Affected packages

Debian:11 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-2.1
1.3.0-2.2
1.3.0-3
1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / yasm

Package

Name
yasm
Purl
pkg:deb/debian/yasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.0-4
1.3.0-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Git / github.com/yasm/yasm

Affected ranges

Type
GIT
Repo
https://github.com/yasm/yasm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.1.0

v1.*

v1.2.0
v1.3.0