libsass: CVE-2017-11605

Related Vulnerabilities: CVE-2017-11605  

Debian Bug report logs - #870184
libsass: CVE-2017-11605

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 30 Jul 2017 19:57:02 UTC

Severity: important

Tags: security

Found in version libsass/3.4.3-1

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Sass team <pkg-sass-devel@lists.alioth.debian.org>:
Bug#870184; Package src:libsass. (Sun, 30 Jul 2017 19:57:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Sass team <pkg-sass-devel@lists.alioth.debian.org>. (Sun, 30 Jul 2017 19:57:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libsass: CVE-2017-11605
Date: Sun, 30 Jul 2017 21:52:15 +0200
Source: libsass
Version: 3.4.3-1
Severity: grave
Tags: security

Hi,

the following vulnerability was published for libass.

CVE-2017-11605[0]:
| There is a heap based buffer over-read in LibSass 3.4.5, related to
| address 0xb4803ea1. A crafted input will lead to a remote denial of
| service attack.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-11605
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11605
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1474019

This so far were only reported to the Red Hat bugzilla, can you check
if it is known to upstream and forward it to the issue tracker for
upstream?

Regards,
Salvatore



Severity set to 'important' from 'grave' Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 30 Jul 2017 20:03:06 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:28:58 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.