File _patchinfo of Package patchinfo.31927
<patchinfo incident="31927">
<issue tracker="cve" id="2022-43358"/>
<issue tracker="cve" id="2022-43357"/>
<issue tracker="cve" id="2022-26592"/>
<issue tracker="bnc" id="1214576">VUL-0: CVE-2022-26592: libsass: Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector:has_real_parent_ref function.</issue>
<issue tracker="bnc" id="1214575">VUL-0: CVE-2022-43358: libsass: Stack overflow vulnerability in ast_selectors.cpp: in function Sass:ComplexSelector:has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).</issue>
<issue tracker="bnc" id="1214573">VUL-0: CVE-2022-43357: sassc,libsass: Stack overflow vulnerability in ast_selectors.cpp in function Sass:CompoundSelector:has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS).</issue>
<packager>mvetter</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for libsass</summary>
<description>This update for libsass fixes the following issues:
- CVE-2022-26592: Fixed Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector:has_real_parent_ref function (bsc#1214576)
- CVE-2022-43358: Fixed Stack overflow vulnerability in ast_selectors.cpp (bsc#1214575).
- CVE-2022-43357: Fixed Stack overflow vulnerability in ast_selectors.cpp (bsc#1214573).
</description>
</patchinfo>