cvrf2cusa/cvrf/2024/cvrf-openEuler-SA-2024-1049.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

172 lines
8.8 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for libsass is now available for openEuler-22.03-LTS-SP3</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2024-1049</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2024-01-12</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2024-01-12</InitialReleaseDate>
<CurrentReleaseDate>2024-01-12</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2024-01-12</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libsass security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libsass is now available for openEuler-22.03-LTS-SP3.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Libsass is a Sass CSS precompiler which is ported for C/C++. This version is more efficient and portable than the original Ruby version. Keeping light and sample is its degisn philosophy which makes it more easier to be built and integrated with a immense amount of platforms and languages. Installation of saccs is needed if you want to run is directly as libsass is just a library.
Security Fix(es):
Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function.(CVE-2022-26592)
Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2.(CVE-2022-43357)
Stack overflow vulnerability in ast_selectors.cpp: in function Sass::ComplexSelector::has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).(CVE-2022-43358)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libsass is now available for openEuler-22.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libsass</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1049</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-26592</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-43357</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-43358</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-26592</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-43357</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-43358</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="libsass-debugsource-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-debugsource-3.6.4-2.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="libsass-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-3.6.4-2.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="libsass-devel-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-devel-3.6.4-2.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="libsass-debuginfo-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-debuginfo-3.6.4-2.oe2203sp3.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="libsass-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-3.6.4-2.oe2203sp3.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libsass-debuginfo-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-debuginfo-3.6.4-2.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="libsass-debugsource-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-debugsource-3.6.4-2.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="libsass-devel-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-devel-3.6.4-2.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="libsass-3.6.4-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libsass-3.6.4-2.oe2203sp3.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function.</Note>
</Notes>
<ReleaseDate>2024-01-12</ReleaseDate>
<CVE>CVE-2022-26592</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.8</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libsass security update</Description>
<DATE>2024-01-12</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1049</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2.</Note>
</Notes>
<ReleaseDate>2024-01-12</ReleaseDate>
<CVE>CVE-2022-43357</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libsass security update</Description>
<DATE>2024-01-12</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1049</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">Stack overflow vulnerability in ast_selectors.cpp: in function Sass::ComplexSelector::has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).</Note>
</Notes>
<ReleaseDate>2024-01-12</ReleaseDate>
<CVE>CVE-2022-43358</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libsass security update</Description>
<DATE>2024-01-12</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1049</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>