SB2023122736 - Gentoo update for NASM
Published: December 27, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2019-8343)
The vulnerability allows a local attacker to gain elevated privileges.
The vulnerability exists due to a use-after-free error in the paste_tokens function, as defined in the asm/preproc.c source code file. A local attacker can access the targeted system, make system calls that submit malicious input, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Input validation error (CVE-ID: CVE-2020-21528)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the ieee_segment() function in outieee.c. A remote attacker can pass specially crafted assembly file to the compiler and perform a denial of service (DoS) attack.
3) Heap-based buffer overflow (CVE-ID: CVE-2022-44370)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the quote_for_pmake() function in asm/nasm.c. A remote attacker can pass specially crafted file to the compiler, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.