First published: Wed Mar 29 2023(Updated: )
NASM 2.16 (development) is vulnerable to 476: Null Pointer Dereference via output/outaout.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nasm Netwide Assembler | =2.16 | |
Nasm Netwide Assembler | =2.16-rc0 | |
Nasm Netwide Assembler | =2.16-rc10 | |
Nasm Netwide Assembler | =2.16-rc11 | |
Nasm Netwide Assembler | =2.16-rc12 | |
Nasm Netwide Assembler | =2.16-rc4 | |
Nasm Netwide Assembler | =2.16-rc5 | |
Nasm Netwide Assembler | =2.16-rc6 | |
Nasm Netwide Assembler | =2.16-rc7 | |
Nasm Netwide Assembler | =2.16-rc8 | |
Nasm Netwide Assembler | =2.16-rc9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-44369.
The title of this NASM vulnerability is 'NASM 2.16 (development) is vulnerable to 476: Null Pointer Dereference via output/outaout.c.'
The severity of the vulnerability is medium with a CVSS score of 5.5.
NASM 2.16 (development) and its release candidates (rc0, rc10, rc11, rc12, rc4, rc5, rc6, rc7, rc8, rc9) are affected.
A fix for this NASM vulnerability is not yet available. It is recommended to follow the vendor's security advisory for updates and patches.