
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow vulnerability in inc_fopen() function located in modules/preprocs/nasm/nasm-pp.c (NVD, Debian Tracker).
The vulnerability exists in the inc_fopen() function within the NASM preprocessor module (modules/preprocs/nasm/nasm-pp.c). When triggered, it causes a heap buffer overflow during string concatenation operations. The issue was identified through AddressSanitizer which detected a WRITE operation of size 23 bytes beyond the allocated buffer region of 26 bytes (GitHub Issue).
The heap buffer overflow vulnerability could potentially lead to memory corruption and program crashes, resulting in denial of service conditions. The issue affects multiple Debian releases including bullseye, bookworm, and sid/trixie, where the package remains vulnerable (Debian Tracker).
As of the latest reports, the vulnerability remains unfixed in the affected versions. The issue has been reported to the upstream maintainers but no official patch has been released (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."