Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1072

NIXPKGS-2026-1072
published on
Permalink CVE-2026-6067
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 5 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • nasmfmt
    • tree-sitter-grammars.tree-sitter-nasm
    • vimPlugins.nvim-treesitter-parsers.nasm
    • python314Packages.tree-sitter-grammars.tree-sitter-nasm
    • python313Packages.tree-sitter-grammars.tree-sitter-nasm
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
CVE-2026-6067

A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to heap memory corruption, denial of service (crash), and arbitrary code execution.

Affected products

NASM
  • ==nasm-3.02rc5

Matching in nixpkgs

pkgs.nasm

80x86 and x86-64 assembler designed for portability and modularity

Ignored packages (5)

Package maintainers