[Nasm-bugs] [Bug 3392816] New: Stack-buffer-overflow in NASM on address 0x7ffea836fb08

noreply-nasm at dev.nasm.us noreply-nasm at dev.nasm.us
Tue Oct 11 08:37:07 PDT 2022


            Bug ID: 3392816
           Summary: Stack-buffer-overflow in NASM on address
           Product: NASM
           Version: 2.16 (development)
          Hardware: All
                OS: All
            Status: OPEN
          Severity: critical
          Priority: Medium
         Component: Assembler
          Assignee: nobody at nasm.us
          Reporter: xudong.c at foxmail.com
                CC: chang.seok.bae at intel.com, gorcunov at gmail.com,
                    hpa at zytor.com, nasm-bugs at nasm.us
     Obtained from: Binary from nasm.us

Created attachment 411855
  --> https://bugzilla.nasm.us/attachment.cgi?id=411855&action=edit
The detail and POC

Hi, developers of NASM:
I tested the binary nasm with my fuzzer, and a crash incurred, i.e.,
Stack-buffer-overflow error. The version of NASM is the latest (the newest
master branch in github (https://github.com/netwide-assembler/nasm.git),
version: NASM version 2.16rc0 compiled on Sep 20 2022) and the operation system
is Ubuntu 18.04.6 LTS (docker). The detail and POC are in the attachment.

Wanying Cao(NCNIPC of China) (E-mail: caowy at nipc.org.cn)
Zelin Yang (NCNIPC of China)
Yuhang Huang (NCNIPC of China) 
Han Zheng (NCNIPC of China, Hexhive)

You are receiving this mail because:
You are watching all bug changes.
You are on the CC list for the bug.

More information about the Nasm-bugs mailing list