I dug into the LTO for this package - it was fixed in a later package
update after impish:

libsass (3.6.5+20231221-1) experimental; urgency=high

  [ upstream ]
  * new development snapshot
    + fix most urgent issues in 2023;
      closes: bug#1051893, #1051894, #1051895;
      CVE-2022-26592 CVE-2022-43357 CVE-2022-43358

  [ Jonas Smedegaard ]
  * update copyright info: update coverage
  * set urgency=high due to security bugfixes
  * enable link-time optimization;
    closes: bug#1015519, thanks to Matthias Klose

 -- Jonas Smedegaard <d...@jones.dk>  Thu, 21 Dec 2023 19:57:09 +0100

so the package is infact LTO enabled, despite being present in the
global lto-disabled-list package.


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26592

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-43357

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-43358

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2095582

Title:
  [MIR] libsass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsass/+bug/2095582/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to