
Cloud Vulnerability DB
A community-led vulnerabilities database
A segmentation violation vulnerability was discovered in yasm version 1.3.0.55.g101bc, specifically in the delete_Token function located in modules/preprocs/nasm/nasm-pp.c. This vulnerability has been assigned CVE-2023-29581 and is currently marked as disputed. The vendor's position is that there is no security relevance because input validation should occur before data reaches libyasm, or the application should run in a sandbox (NVD, Debian Tracker).
The vulnerability manifests as a segmentation violation (SEGV) caused by a READ memory access to address 0x000000000000, indicating a null pointer dereference. The issue occurs in the delete_Token function, which is called through a chain of functions including expand_macros_in_string and do_directive. The vulnerability has been assigned a CVSS v3.1 score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H (GitHub Issue, NVD).
While the vulnerability could cause the application to become unavailable through a segmentation fault, the vendor maintains that this does not constitute a security issue. According to the yasm security policy, the assembler is not designed to handle untrusted input, and it is the developer's responsibility to either verify code authenticity or run untrusted code in a sandbox (Yasm Security).
The vendor recommends either validating input before it reaches libyasm or running the application in a sandbox environment. According to the security policy, it is the responsibility of the application using libyasm to ensure that the environment is isolated or that input is properly sanitized (Yasm Security).
The vulnerability has been disputed by both the vendor and the security community. Red Hat's Bugzilla report questions the security implications of the issue, noting that assemblers are not services and shouldn't be required to accept untrusted input (Red Hat Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."