[USN-3694-1] NASM vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============6363278007329477949==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”hh8JWeStNciu5Tl6UbgbgpM9q06XKkWZi”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–hh8JWeStNciu5Tl6UbgbgpM9q06XKkWZi
Content-Type: multipart/mixed; boundary=”D3cD62VpycwObftFa0MGVaLkpMkEefBaD”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3694-1] NASM vulnerabilities

–D3cD62VpycwObftFa0MGVaLkpMkEefBaD
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3694-1
June 28, 2018

nasm vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

NASM could be made to crash or run programs if it opened a specially
crafted file.

Software Description:
– nasm: General-purpose x86 assembler

Details:

It was discovered that NASM incorrectly handled certain source files. If =
a
user or automated system were tricked into processing a specially crafted=

source file, a remote attacker could use these issues to cause NASM to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
nasm 2.10.09-1ubuntu0.1

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3694-1
CVE-2017-10686, CVE-2017-11111, CVE-2017-14228, CVE-2017-17810,
CVE-2017-17811, CVE-2017-17812, CVE-2017-17813, CVE-2017-17814,
CVE-2017-17815, CVE-2017-17816, CVE-2017-17817, CVE-2017-17818,
CVE-2017-17819, CVE-2017-17820, CVE-2018-8881

Package Information:
https://launchpad.net/ubuntu/+source/nasm/2.10.09-1ubuntu0.1

–D3cD62VpycwObftFa0MGVaLkpMkEefBaD–

–hh8JWeStNciu5Tl6UbgbgpM9q06XKkWZi
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=OK0R
—–END PGP SIGNATURE—–

–hh8JWeStNciu5Tl6UbgbgpM9q06XKkWZi–

–===============6363278007329477949==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============6363278007329477949==–