File _patchinfo of Package patchinfo.31927

<patchinfo incident="31927">
  <issue tracker="cve" id="2022-43358"/>
  <issue tracker="cve" id="2022-43357"/>
  <issue tracker="cve" id="2022-26592"/>
  <issue tracker="bnc" id="1214576">VUL-0: CVE-2022-26592: libsass: Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector:has_real_parent_ref function.</issue>
  <issue tracker="bnc" id="1214575">VUL-0: CVE-2022-43358: libsass: Stack overflow vulnerability in ast_selectors.cpp: in function Sass:ComplexSelector:has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).</issue>
  <issue tracker="bnc" id="1214573">VUL-0: CVE-2022-43357: sassc,libsass: Stack overflow vulnerability in ast_selectors.cpp in function Sass:CompoundSelector:has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS).</issue>
  <packager>mvetter</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for libsass</summary>
  <description>This update for libsass fixes the following issues:

- CVE-2022-26592: Fixed Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector:has_real_parent_ref function (bsc#1214576)
- CVE-2022-43358: Fixed Stack overflow vulnerability in ast_selectors.cpp (bsc#1214575).
- CVE-2022-43357: Fixed Stack overflow vulnerability in ast_selectors.cpp (bsc#1214573).
</description>
</patchinfo>
openSUSE Build Service is sponsored by