There are 3 open security issues in bookworm.
3 issues left for the package maintainer to handle:
- CVE-2025-8845:
(needs triaging)
A vulnerability was identified in NASM Netwide Assember 2.17rc0. This issue affects the function assemble_file of the file nasm.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
- CVE-2026-6067:
(postponed; to be fixed through a stable update)
A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to heap memory corruption, denial of service (crash), and arbitrary code execution.
- CVE-2026-6069:
(postponed; to be fixed through a stable update)
NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity.
You can find information about how to handle these issues in the security team's documentation.