File _patchinfo of Package patchinfo.7438

<patchinfo incident="7438">
  <issue id="1050148" tracker="bnc">VUL-1: python3-libsass: Stack-overflow in the sassc of  libsass library.</issue>
  <issue id="1050149" tracker="bnc">VUL-1: python3-libsass: Illegal address access in eval.cpp of libsass</issue>
  <issue id="1050150" tracker="bnc">VUL-1: python3-libsass: Stack-overflow in the sassc  of  libsass library in Parser::advanceToNextToken()</issue>
  <issue id="1050151" tracker="bnc">VUL-1: CVE-2017-11605: python3-libsass: Heap based buffer over-read leading to DoS</issue>
  <issue id="1050380" tracker="bnc">VUL-1: libsass: Heap based buffer overflow</issue>
  <issue id="2017-11608" tracker="cve" />
  <issue id="2017-11555" tracker="cve" />
  <issue id="2017-11556" tracker="cve" />
  <issue id="2017-11605" tracker="cve" />
  <issue id="2017-11554" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>cbosdonnat</packager>
  <description>This update for libsass fixes the following DoS vulnerabilities:

- CVE-2017-11554: Stack consumption vulnerability allowed remote DoS via crafted input (1050148)
- CVE-2017-11555: Illegal address access in Eval::operator allowed remote DoS via crafted input (boo#1050149)
- CVE-2017-11556: Stack consumption vulnerability allowed remote DoS via crafted input (boo#1050150)
- CVE-2017-11605: Heap based buffer over-read allowed remote DoS via crafted input (boo#1050151)
- CVE-2017-11608: Heap-based buffer over-read allowed remote DoS via crafted input (boo#1050380)
</description>
  <summary>Security update for libsass</summary>
</patchinfo>
openSUSE Build Service is sponsored by