yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
References
Link | Resource |
---|---|
https://github.com/yasm/yasm/issues/207 | Exploit Issue Tracking |
https://github.com/yasm/yasm/issues/207 | Exploit Issue Tracking |
Configurations
History
21 Nov 2024, 08:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yasm/yasm/issues/207 - Exploit, Issue Tracking |
03 Jul 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-590 |
17 May 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. |
Information
Published : 2023-05-09 14:15
Updated : 2024-11-21 08:02
NVD link : CVE-2023-31973
Mitre link : CVE-2023-31973
CVE.ORG link : CVE-2023-31973
JSON object : View
Products Affected
tortall
- yasm