MGASA-2020-0303 - Updated nasm packages fix security vulnerability

Publication date: 31 Jul 2020
URL: https://advisories.mageia.org/MGASA-2020-0303.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2018-10016,
     CVE-2018-10254,
     CVE-2018-10316,
     CVE-2018-16382,
     CVE-2018-16517,
     CVE-2018-16999,
     CVE-2018-19214,
     CVE-2018-19215,
     CVE-2018-1000667

Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm
function of the disasm/disasm.c file. Remote attackers could leverage this
vulnerability to cause a denial of service or possibly have unspecified other
impact via a crafted ELF file (CVE-2018-10254).

Netwide Assembler (NASM) 2.14rc0 has an endless while loop in the
assemble_file function of asm/nasm.c because of a globallineno integer
overflow (CVE-2018-10316).

Netwide Assembler (NASM) 2.14rc15 has a buffer over-read in x86/regflags.c
(CVE-2018-16382).

NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a
memory corruption (crashed) of nasm when handling a crafted file due to
function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in
function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result
in aborting/crash nasm program. This attack appear to be exploitable via a
specially crafted asm file (CVE-2018-1000667).

asm/labels.c in Netwide Assembler (NASM) is prone to NULL Pointer Dereference,
which allows the attacker to cause a denial of service via a crafted file
(CVE-2018-16517).

Netwide Assembler (NASM) 2.14rc15 has an invalid memory write (segmentation
fault) in expand_smacro in preproc.c, which allows attackers to cause a denial
of service via a crafted input file (CVE-2018-16999).

Netwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in
expand_mmac_params in asm/preproc.c for the special cases of the % and $ and !
characters (CVE-2018-19215).

Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in
expand_mmac_params in asm/preproc.c for insufficient input (CVE-2018-19214).

References:
- https://bugs.mageia.org/show_bug.cgi?id=26916
- https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16999
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667

SRPMS:
- 7/core/nasm-2.14.02-1.mga7

Mageia 2020-0303: nasm security update

Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm function of the disasm/disasm.c file

Summary

Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm function of the disasm/disasm.c file. Remote attackers could leverage this vulnerability to cause a denial of service or possibly have unspecified other impact via a crafted ELF file (CVE-2018-10254).
Netwide Assembler (NASM) 2.14rc0 has an endless while loop in the assemble_file function of asm/nasm.c because of a globallineno integer overflow (CVE-2018-10316).
Netwide Assembler (NASM) 2.14rc15 has a buffer over-read in x86/regflags.c (CVE-2018-16382).
NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result in aborting/crash nasm program. This attack appear to be exploitable via a specially crafted asm file (CVE-2018-1000667).
asm/labels.c in Netwide Assembler (NASM) is prone to NULL Pointer Dereference, which allows the attacker to cause a denial of service via a crafted file (CVE-2018-16517).
Netwide Assembler (NASM) 2.14rc15 has an invalid memory write (segmentation fault) in expand_smacro in preproc.c, which allows attackers to cause a denial of service via a crafted input file (CVE-2018-16999).
Netwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for the special cases of the % and $ and ! characters (CVE-2018-19215).
Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for insufficient input (CVE-2018-19214).

References

- https://bugs.mageia.org/show_bug.cgi?id=26916

- https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html

- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16517

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16999

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667

Resolution

MGASA-2020-0303 - Updated nasm packages fix security vulnerability

SRPMS

- 7/core/nasm-2.14.02-1.mga7

Severity
Publication date: 31 Jul 2020
URL: https://advisories.mageia.org/MGASA-2020-0303.html
Type: security
CVE: CVE-2018-10016, CVE-2018-10254, CVE-2018-10316, CVE-2018-16382, CVE-2018-16517, CVE-2018-16999, CVE-2018-19214, CVE-2018-19215, CVE-2018-1000667

Related News