Packages
- nasm - Netwide Assembler
Details
Daisy Chen discovered that NASM was vulnerable to a heap buffer overflow
when handling certain input. An attacker could possibly use this issue
to cause NASM to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2023-31722)
It was discovered that NASM incorrectly handled memory allocation.
An attacker could possibly use this issue to cause NASM to use
excessive resources, leading to a denial of service. This issue
only affected Ubuntu 24.04 LTS. (CVE-2021-33452, CVE-2021-33450)
Daisy Chen discovered that NASM was vulnerable to a heap buffer overflow
when handling certain input. An attacker could possibly use this issue
to cause NASM to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2023-31722)
It was discovered that NASM incorrectly handled memory allocation.
An attacker could possibly use this issue to cause NASM to use
excessive resources, leading to a denial of service. This issue
only affected Ubuntu 24.04 LTS. (CVE-2021-33452, CVE-2021-33450)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
| Ubuntu Release | Package Version | ||
|---|---|---|---|
| 24.04 LTS noble | nasm – 2.16.01-1ubuntu0.1~esm1 | ||
| 22.04 LTS jammy | nasm – 2.15.05-1ubuntu0.1~esm1 | ||
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.