OESA-2024-1814

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1814
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1814.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-1814
Upstream
Published
2024-07-05T11:08:27Z
Modified
2025-08-12T05:34:39.878544Z
Summary
nasm security update
Details

NASM is the Netwide Assembler, a free portable assembler for the Intel 80x86 microprocessor series, using primarily the traditional Intel instruction mnemonics and syntax. It also provides tools in RDOFF binary format, includes linker, library manager, loader, and information dump.

Security Fix(es):

Buffer Overflow vulnerability in hash_findi function in hashtbl.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file.(CVE-2020-21685)

A stack-use-after-scope issue discovered in expandmmacparams function in preproc.c in nasm before 2.15.04 allows remote attackers to cause a denial of service via crafted asm file.(CVE-2020-21686)

Buffer Overflow vulnerability in scan function in stdscan.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file.(CVE-2020-21687)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / nasm

Package

Name
nasm
Purl
pkg:rpm/openEuler/nasm&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.15.05-1.oe2003sp4

Ecosystem specific

{
    "noarch": [
        "nasm-help-2.15.05-1.oe2003sp4.noarch.rpm"
    ],
    "src": [
        "nasm-2.15.05-1.oe2003sp4.src.rpm"
    ],
    "aarch64": [
        "nasm-2.15.05-1.oe2003sp4.aarch64.rpm",
        "nasm-debuginfo-2.15.05-1.oe2003sp4.aarch64.rpm",
        "nasm-debugsource-2.15.05-1.oe2003sp4.aarch64.rpm"
    ],
    "x86_64": [
        "nasm-2.15.05-1.oe2003sp4.x86_64.rpm",
        "nasm-debuginfo-2.15.05-1.oe2003sp4.x86_64.rpm",
        "nasm-debugsource-2.15.05-1.oe2003sp4.x86_64.rpm"
    ]
}