An update for libsass is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1018 Final 1.0 1.0 2024-01-05 Initial 2024-01-05 2024-01-05 openEuler SA Tool V1.0 2024-01-05 libsass security update An update for libsass is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. Libsass is a Sass CSS precompiler which is ported for C/C++. This version is more efficient and portable than the original Ruby version. Keeping light and sample is its degisn philosophy which makes it more easier to be built and integrated with a immense amount of platforms and languages. Installation of saccs is needed if you want to run is directly as libsass is just a library. Security Fix(es): Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function.(CVE-2022-26592) Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2.(CVE-2022-43357) Stack overflow vulnerability in ast_selectors.cpp: in function Sass::ComplexSelector::has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).(CVE-2022-43358) An update for libsass is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High libsass https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1018 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-26592 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-43357 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-43358 https://nvd.nist.gov/vuln/detail/CVE-2022-26592 https://nvd.nist.gov/vuln/detail/CVE-2022-43357 https://nvd.nist.gov/vuln/detail/CVE-2022-43358 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 libsass-debuginfo-3.6.4-2.oe1.aarch64.rpm libsass-debugsource-3.6.4-2.oe1.aarch64.rpm libsass-3.6.4-2.oe1.aarch64.rpm libsass-devel-3.6.4-2.oe1.aarch64.rpm libsass-debugsource-3.6.4-2.oe1.aarch64.rpm libsass-devel-3.6.4-2.oe1.aarch64.rpm libsass-3.6.4-2.oe1.aarch64.rpm libsass-debuginfo-3.6.4-2.oe1.aarch64.rpm libsass-3.6.4-2.oe2003sp4.aarch64.rpm libsass-debugsource-3.6.4-2.oe2003sp4.aarch64.rpm libsass-debuginfo-3.6.4-2.oe2003sp4.aarch64.rpm libsass-devel-3.6.4-2.oe2003sp4.aarch64.rpm libsass-3.6.4-2.oe2203.aarch64.rpm libsass-devel-3.6.4-2.oe2203.aarch64.rpm libsass-debugsource-3.6.4-2.oe2203.aarch64.rpm libsass-debuginfo-3.6.4-2.oe2203.aarch64.rpm libsass-debuginfo-3.6.4-2.oe2203sp1.aarch64.rpm libsass-3.6.4-2.oe2203sp1.aarch64.rpm libsass-debugsource-3.6.4-2.oe2203sp1.aarch64.rpm libsass-devel-3.6.4-2.oe2203sp1.aarch64.rpm libsass-devel-3.6.4-2.oe2203sp2.aarch64.rpm libsass-debuginfo-3.6.4-2.oe2203sp2.aarch64.rpm libsass-3.6.4-2.oe2203sp2.aarch64.rpm libsass-debugsource-3.6.4-2.oe2203sp2.aarch64.rpm libsass-3.6.4-2.oe1.src.rpm libsass-3.6.4-2.oe1.src.rpm libsass-3.6.4-2.oe2003sp4.src.rpm libsass-3.6.4-2.oe2203.src.rpm libsass-3.6.4-2.oe2203sp1.src.rpm libsass-3.6.4-2.oe2203sp2.src.rpm libsass-debugsource-3.6.4-2.oe1.x86_64.rpm libsass-debuginfo-3.6.4-2.oe1.x86_64.rpm libsass-3.6.4-2.oe1.x86_64.rpm libsass-devel-3.6.4-2.oe1.x86_64.rpm libsass-debugsource-3.6.4-2.oe1.x86_64.rpm libsass-debuginfo-3.6.4-2.oe1.x86_64.rpm libsass-devel-3.6.4-2.oe1.x86_64.rpm libsass-3.6.4-2.oe1.x86_64.rpm libsass-devel-3.6.4-2.oe2003sp4.x86_64.rpm libsass-3.6.4-2.oe2003sp4.x86_64.rpm libsass-debuginfo-3.6.4-2.oe2003sp4.x86_64.rpm libsass-debugsource-3.6.4-2.oe2003sp4.x86_64.rpm libsass-devel-3.6.4-2.oe2203.x86_64.rpm libsass-3.6.4-2.oe2203.x86_64.rpm libsass-debugsource-3.6.4-2.oe2203.x86_64.rpm libsass-debuginfo-3.6.4-2.oe2203.x86_64.rpm libsass-debugsource-3.6.4-2.oe2203sp1.x86_64.rpm libsass-3.6.4-2.oe2203sp1.x86_64.rpm libsass-devel-3.6.4-2.oe2203sp1.x86_64.rpm libsass-debuginfo-3.6.4-2.oe2203sp1.x86_64.rpm libsass-debugsource-3.6.4-2.oe2203sp2.x86_64.rpm libsass-debuginfo-3.6.4-2.oe2203sp2.x86_64.rpm libsass-devel-3.6.4-2.oe2203sp2.x86_64.rpm libsass-3.6.4-2.oe2203sp2.x86_64.rpm Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function. 2024-01-05 CVE-2022-26592 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 High 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H libsass security update 2024-01-05 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1018 Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2. 2024-01-05 CVE-2022-43357 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H libsass security update 2024-01-05 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1018 Stack overflow vulnerability in ast_selectors.cpp: in function Sass::ComplexSelector::has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS). 2024-01-05 CVE-2022-43358 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H libsass security update 2024-01-05 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1018