yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
References
Link | Resource |
---|---|
https://github.com/yasm/yasm/issues/207 | Exploit Issue Tracking |
https://github.com/yasm/yasm/issues/207 | Exploit Issue Tracking |
Configurations
History
21 Nov 2024, 08:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yasm/yasm/issues/207 - Exploit, Issue Tracking |
03 Jul 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-590 |
16 May 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. |
05 Jul 2023, 19:00
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Information
Published : 2023-05-09 14:15
Updated : 2024-11-21 08:02
NVD link : CVE-2023-31973
Mitre link : CVE-2023-31973
CVE.ORG link : CVE-2023-31973
JSON object : View
Products Affected
tortall
- yasm