Vulnerability from csaf_opensuse
Published
2019-08-14 10:51
Modified
2019-08-14 10:51
Summary
Security update for libsass
Notes
Title of the patch
Security update for libsass
Description of the patch
This update for libsass to version 3.6.1 fixes the following issues:
Security issues fixed:
- CVE-2019-6283: Fixed heap-buffer-overflow in Sass::Prelexer::parenthese_scope(char const*) (boo#1121943).
- CVE-2019-6284: Fixed heap-based buffer over-read exists in Sass:Prelexer:alternatives (boo#1121944).
- CVE-2019-6286: Fixed heap-based buffer over-read exists in Sass:Prelexer:skip_over_scopes (boo#1121945).
- CVE-2018-11499: Fixed use-after-free vulnerability in sass_context.cpp:handle_error (boo#1096894).
- CVE-2018-19797: Disallowed parent selector in selector_fns arguments (boo#1118301).
- CVE-2018-19827: Fixed use-after-free vulnerability exists in the SharedPtr class (boo#1118346).
- CVE-2018-19837: Fixed stack overflow in Eval::operator() (boo#1118348).
- CVE-2018-19838: Fixed stack-overflow at IMPLEMENT_AST_OPERATORS expansion (boo#1118349).
- CVE-2018-19839: Fixed buffer-overflow (OOB read) against some invalid input (boo#1118351).
- CVE-2018-20190: Fixed Null pointer dereference in Sass::Eval::operator()(Sass::Supports_Operator*) (boo#1119789).
- CVE-2018-20821: Fixed uncontrolled recursion in Sass:Parser:parse_css_variable_value (boo#1133200).
- CVE-2018-20822: Fixed stack-overflow at Sass::Inspect::operator() (boo#1133201).
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patchnames
openSUSE-2019-1883
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for libsass", title: "Title of the patch", }, { category: "description", text: "This update for libsass to version 3.6.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-6283: Fixed heap-buffer-overflow in Sass::Prelexer::parenthese_scope(char const*) (boo#1121943).\n- CVE-2019-6284: Fixed heap-based buffer over-read exists in Sass:Prelexer:alternatives (boo#1121944).\n- CVE-2019-6286: Fixed heap-based buffer over-read exists in Sass:Prelexer:skip_over_scopes (boo#1121945).\n- CVE-2018-11499: Fixed use-after-free vulnerability in sass_context.cpp:handle_error (boo#1096894).\n- CVE-2018-19797: Disallowed parent selector in selector_fns arguments (boo#1118301).\n- CVE-2018-19827: Fixed use-after-free vulnerability exists in the SharedPtr class (boo#1118346).\n- CVE-2018-19837: Fixed stack overflow in Eval::operator() (boo#1118348).\n- CVE-2018-19838: Fixed stack-overflow at IMPLEMENT_AST_OPERATORS expansion (boo#1118349).\n- CVE-2018-19839: Fixed buffer-overflow (OOB read) against some invalid input (boo#1118351).\n- CVE-2018-20190: Fixed Null pointer dereference in Sass::Eval::operator()(Sass::Supports_Operator*) (boo#1119789).\n- CVE-2018-20821: Fixed uncontrolled recursion in Sass:Parser:parse_css_variable_value (boo#1133200).\n- CVE-2018-20822: Fixed stack-overflow at Sass::Inspect::operator() (boo#1133201).\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-1883", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1883-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:1883-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPU3GRLOX4PSKM4UBZP2UQ5JATS5U6U6/#HPU3GRLOX4PSKM4UBZP2UQ5JATS5U6U6", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:1883-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPU3GRLOX4PSKM4UBZP2UQ5JATS5U6U6/#HPU3GRLOX4PSKM4UBZP2UQ5JATS5U6U6", }, { category: "self", summary: "SUSE Bug 1096894", url: "https://bugzilla.suse.com/1096894", }, { category: "self", summary: "SUSE Bug 1118301", url: "https://bugzilla.suse.com/1118301", }, { category: "self", summary: "SUSE Bug 1118346", url: "https://bugzilla.suse.com/1118346", }, { category: "self", summary: "SUSE Bug 1118348", url: "https://bugzilla.suse.com/1118348", }, { category: "self", summary: "SUSE Bug 1118349", url: "https://bugzilla.suse.com/1118349", }, { category: "self", summary: "SUSE Bug 1118351", url: "https://bugzilla.suse.com/1118351", }, { category: "self", summary: "SUSE Bug 1119789", url: "https://bugzilla.suse.com/1119789", }, { category: "self", summary: "SUSE Bug 1121943", url: "https://bugzilla.suse.com/1121943", }, { category: "self", summary: "SUSE Bug 1121944", url: "https://bugzilla.suse.com/1121944", }, { category: "self", summary: "SUSE Bug 1121945", url: "https://bugzilla.suse.com/1121945", }, { category: "self", summary: "SUSE Bug 1133200", url: "https://bugzilla.suse.com/1133200", }, { category: "self", summary: "SUSE Bug 1133201", url: "https://bugzilla.suse.com/1133201", }, { category: "self", summary: "SUSE CVE CVE-2018-11499 page", url: "https://www.suse.com/security/cve/CVE-2018-11499/", }, { category: "self", summary: "SUSE CVE CVE-2018-19797 page", url: "https://www.suse.com/security/cve/CVE-2018-19797/", }, { category: "self", summary: "SUSE CVE CVE-2018-19827 page", url: "https://www.suse.com/security/cve/CVE-2018-19827/", }, { category: "self", summary: "SUSE CVE CVE-2018-19837 page", url: "https://www.suse.com/security/cve/CVE-2018-19837/", }, { category: "self", summary: "SUSE CVE CVE-2018-19838 page", url: "https://www.suse.com/security/cve/CVE-2018-19838/", }, { category: "self", summary: "SUSE CVE CVE-2018-19839 page", url: "https://www.suse.com/security/cve/CVE-2018-19839/", }, { category: "self", summary: "SUSE CVE CVE-2018-20190 page", url: "https://www.suse.com/security/cve/CVE-2018-20190/", }, { category: "self", summary: "SUSE CVE CVE-2018-20821 page", url: "https://www.suse.com/security/cve/CVE-2018-20821/", }, { category: "self", summary: "SUSE CVE CVE-2018-20822 page", url: "https://www.suse.com/security/cve/CVE-2018-20822/", }, { category: "self", summary: "SUSE CVE CVE-2019-6283 page", url: "https://www.suse.com/security/cve/CVE-2019-6283/", }, { category: "self", summary: "SUSE CVE CVE-2019-6284 page", url: "https://www.suse.com/security/cve/CVE-2019-6284/", }, { category: "self", summary: "SUSE CVE CVE-2019-6286 page", url: "https://www.suse.com/security/cve/CVE-2019-6286/", }, ], title: "Security update for libsass", tracking: { current_release_date: "2019-08-14T10:51:26Z", generator: { date: "2019-08-14T10:51:26Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:1883-1", initial_release_date: "2019-08-14T10:51:26Z", revision_history: [ { date: "2019-08-14T10:51:26Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", product: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", product_id: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", }, }, { category: "product_version", name: "libsass-devel-3.6.1-bp151.4.3.1.aarch64", product: { name: "libsass-devel-3.6.1-bp151.4.3.1.aarch64", product_id: "libsass-devel-3.6.1-bp151.4.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", product: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", product_id: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", }, }, { category: "product_version", name: "libsass-devel-3.6.1-bp151.4.3.1.ppc64le", product: { name: "libsass-devel-3.6.1-bp151.4.3.1.ppc64le", product_id: "libsass-devel-3.6.1-bp151.4.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", product: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", product_id: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", }, }, { category: "product_version", name: "libsass-devel-3.6.1-bp151.4.3.1.s390x", product: { name: "libsass-devel-3.6.1-bp151.4.3.1.s390x", product_id: "libsass-devel-3.6.1-bp151.4.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", product: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", product_id: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", }, }, { category: "product_version", name: "libsass-devel-3.6.1-bp151.4.3.1.x86_64", product: { name: "libsass-devel-3.6.1-bp151.4.3.1.x86_64", product_id: "libsass-devel-3.6.1-bp151.4.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Package Hub 15 SP1", product: { name: "SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1", }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64 as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", }, product_reference: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", }, product_reference: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", }, product_reference: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64 as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", }, product_reference: "libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsass-devel-3.6.1-bp151.4.3.1.aarch64 as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", }, product_reference: "libsass-devel-3.6.1-bp151.4.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsass-devel-3.6.1-bp151.4.3.1.ppc64le as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", }, product_reference: "libsass-devel-3.6.1-bp151.4.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsass-devel-3.6.1-bp151.4.3.1.s390x as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", }, product_reference: "libsass-devel-3.6.1-bp151.4.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsass-devel-3.6.1-bp151.4.3.1.x86_64 as component of SUSE Package Hub 15 SP1", product_id: "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", }, product_reference: "libsass-devel-3.6.1-bp151.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-11499", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-11499", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability exists in handle_error() in sass_context.cpp in LibSass 3.4.x and 3.5.x through 3.5.4 that could be leveraged to cause a denial of service (application crash) or possibly unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-11499", url: "https://www.suse.com/security/cve/CVE-2018-11499", }, { category: "external", summary: "SUSE Bug 1096894 for CVE-2018-11499", url: "https://bugzilla.suse.com/1096894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "critical", }, ], title: "CVE-2018-11499", }, { cve: "CVE-2018-19797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19797", }, ], notes: [ { category: "general", text: "In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Selector_List::populate_extends in SharedPtr.hpp (used by ast.cpp and ast_selectors.cpp) may cause a Denial of Service (application crash) via a crafted sass input file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19797", url: "https://www.suse.com/security/cve/CVE-2018-19797", }, { category: "external", summary: "SUSE Bug 1118301 for CVE-2018-19797", url: "https://bugzilla.suse.com/1118301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2018-19797", }, { cve: "CVE-2018-19827", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19827", }, ], notes: [ { category: "general", text: "In LibSass 3.5.5, a use-after-free vulnerability exists in the SharedPtr class in SharedPtr.cpp (or SharedPtr.hpp) that may cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19827", url: "https://www.suse.com/security/cve/CVE-2018-19827", }, { category: "external", summary: "SUSE Bug 1118346 for CVE-2018-19827", url: "https://bugzilla.suse.com/1118346", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "important", }, ], title: "CVE-2018-19827", }, { cve: "CVE-2018-19837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19837", }, ], notes: [ { category: "general", text: "In LibSass prior to 3.5.5, Sass::Eval::operator()(Sass::Binary_Expression*) inside eval.cpp allows attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, because of certain incorrect parsing of '%' as a modulo operator in parser.cpp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19837", url: "https://www.suse.com/security/cve/CVE-2018-19837", }, { category: "external", summary: "SUSE Bug 1118348 for CVE-2018-19837", url: "https://bugzilla.suse.com/1118348", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2018-19837", }, { cve: "CVE-2018-19838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19838", }, ], notes: [ { category: "general", text: "In LibSass prior to 3.5.5, functions inside ast.cpp for IMPLEMENT_AST_OPERATORS expansion allow attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, as demonstrated by recursive calls involving clone(), cloneChildren(), and copy().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19838", url: "https://www.suse.com/security/cve/CVE-2018-19838", }, { category: "external", summary: "SUSE Bug 1118349 for CVE-2018-19838", url: "https://bugzilla.suse.com/1118349", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2018-19838", }, { cve: "CVE-2018-19839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19839", }, ], notes: [ { category: "general", text: "In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19839", url: "https://www.suse.com/security/cve/CVE-2018-19839", }, { category: "external", summary: "SUSE Bug 1118351 for CVE-2018-19839", url: "https://bugzilla.suse.com/1118351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2018-19839", }, { cve: "CVE-2018-20190", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20190", }, ], notes: [ { category: "general", text: "In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20190", url: "https://www.suse.com/security/cve/CVE-2018-20190", }, { category: "external", summary: "SUSE Bug 1119789 for CVE-2018-20190", url: "https://bugzilla.suse.com/1119789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2018-20190", }, { cve: "CVE-2018-20821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20821", }, ], notes: [ { category: "general", text: "The parsing component in LibSass through 3.5.5 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Parser::parse_css_variable_value in parser.cpp).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20821", url: "https://www.suse.com/security/cve/CVE-2018-20821", }, { category: "external", summary: "SUSE Bug 1133200 for CVE-2018-20821", url: "https://bugzilla.suse.com/1133200", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2018-20821", }, { cve: "CVE-2018-20822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20822", }, ], notes: [ { category: "general", text: "LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20822", url: "https://www.suse.com/security/cve/CVE-2018-20822", }, { category: "external", summary: "SUSE Bug 1133201 for CVE-2018-20822", url: "https://bugzilla.suse.com/1133201", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2018-20822", }, { cve: "CVE-2019-6283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6283", }, ], notes: [ { category: "general", text: "In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::parenthese_scope in prelexer.hpp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6283", url: "https://www.suse.com/security/cve/CVE-2019-6283", }, { category: "external", summary: "SUSE Bug 1121943 for CVE-2019-6283", url: "https://bugzilla.suse.com/1121943", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2019-6283", }, { cve: "CVE-2019-6284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6284", }, ], notes: [ { category: "general", text: "In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6284", url: "https://www.suse.com/security/cve/CVE-2019-6284", }, { category: "external", summary: "SUSE Bug 1121944 for CVE-2019-6284", url: "https://bugzilla.suse.com/1121944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2019-6284", }, { cve: "CVE-2019-6286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6286", }, ], notes: [ { category: "general", text: "In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6286", url: "https://www.suse.com/security/cve/CVE-2019-6286", }, { category: "external", summary: "SUSE Bug 1121945 for CVE-2019-6286", url: "https://bugzilla.suse.com/1121945", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-3_6_1-1-3.6.1-bp151.4.3.1.x86_64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.aarch64", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.ppc64le", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.s390x", "SUSE Package Hub 15 SP1:libsass-devel-3.6.1-bp151.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-08-14T10:51:26Z", details: "moderate", }, ], title: "CVE-2019-6286", }, ], }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.