First published: Tue Aug 22 2023(Updated: )
Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libsass | =3.6.5-8-g210218 | |
Sassc | =3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43357.
The severity of CVE-2022-43357 is high, with a severity value of 7.5.
CVE-2022-43357 affects the following software: Sass-lang Libsass version 3.6.5-8-g210218 and Sass-lang Sassc version 3.6.2.
CVE-2022-43357 is a stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).
To fix CVE-2022-43357, it is recommended to update to a patched version of Sass-lang Libsass or Sass-lang Sassc as soon as it becomes available.