
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference vulnerability in the do_directive() function within modules/preprocs/nasm/nasm-pp.c. The vulnerability was reported in May 2021 and affects the YASM assembler software (Debian Tracker, YASM Issue).
The vulnerability exists in the do_directive() function located in modules/preprocs/nasm/nasm-pp.c at line 2355. When processing certain malformed input files, the function attempts to dereference a NULL pointer, leading to a segmentation fault. This was confirmed through testing with Address Sanitizer (ASAN) which detected a SEGV (segmentation violation) on an unknown address 0x000000000001 (YASM Issue).
When exploited, this vulnerability can cause the YASM assembler to crash due to the NULL pointer dereference, resulting in a denial of service condition. The issue affects multiple distributions including Debian's bullseye, bookworm, trixie, and sid releases (Debian Tracker).
The vulnerability remains unpatched in YASM 1.3.0. All current versions of the software in various distributions are marked as vulnerable (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."