
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in YASM version 1.3.0 in the expr_traverse_nodes_post() function located in libyasm/expr.c. The vulnerability was reported on May 19, 2021 and affects the core functionality of the YASM assembler (GitHub Issue).
The vulnerability occurs in the expr_traverse_nodes_post() function at line 1112 in libyasm/expr.c. It manifests as a heap-use-after-free condition where the program attempts to read 4 bytes from a memory location that has already been freed. The issue is triggered during the expression traversal process in YASM's expression handling system (GitHub Issue).
The vulnerability can lead to program crashes and potential denial of service conditions when processing specially crafted input files. The issue requires user interaction to exploit, as it is triggered when processing malformed assembly code files (AttackerKB).
The vulnerability affects YASM version 1.3.0 and remains unfixed in several distributions including Debian bullseye, bookworm, and sid. Currently, there is no official patch available. Users are advised to exercise caution when processing untrusted assembly files (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."