mirror of
https://git.yoctoproject.org/poky
synced 2026-03-09 16:59:40 +01:00
A Segmentation Fault issue discovered in in ieee_segment function in outieee.c
in nasm 2.14.03 and 2.15 allows remote attackers to cause a denial of service
via crafted assembly file.
References:
https://nvd.nist.gov/vuln/detail/CVE-2020-21528
Upstream patches:
93c774d482
(From OE-Core rev: 87c4ec2d73ac2e52005e16e38a9a12affb8d51bd)
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
27 lines
877 B
BlitzBasic
27 lines
877 B
BlitzBasic
SUMMARY = "General-purpose x86 assembler"
|
|
SECTION = "devel"
|
|
HOMEPAGE = "http://www.nasm.us/"
|
|
DESCRIPTION = "The Netwide Assembler (NASM) is an assembler and disassembler for the Intel x86 architecture."
|
|
LICENSE = "BSD-2-Clause"
|
|
LIC_FILES_CHKSUM = "file://LICENSE;md5=90904486f8fbf1861cf42752e1a39efe"
|
|
|
|
SRC_URI = "http://www.nasm.us/pub/nasm/releasebuilds/${PV}/nasm-${PV}.tar.bz2 \
|
|
file://0001-stdlib-Add-strlcat.patch \
|
|
file://0002-Add-debug-prefix-map-option.patch \
|
|
file://CVE-2022-44370.patch \
|
|
file://CVE-2022-46457.patch \
|
|
file://CVE-2020-21528.patch \
|
|
"
|
|
|
|
SRC_URI[sha256sum] = "3c4b8339e5ab54b1bcb2316101f8985a5da50a3f9e504d43fa6f35668bee2fd0"
|
|
|
|
EXTRA_AUTORECONF:append = " -I autoconf/m4"
|
|
|
|
inherit autotools-brokensep
|
|
|
|
BBCLASSEXTEND = "native"
|
|
|
|
DEPENDS = "groff-native"
|
|
|
|
CVE_PRODUCT = "netwide_assembler"
|