BLFS Security Advisories for BLFS 12.0 and the current development books.
BLFS-12.0 was released on 2023-09-01
This page is in alphabetical order of packages, and if a package has multiple advisories the newer come first.
The links at the end of each item point to more details which have links to the released books.
In general, the severity is taken from upstream, if supplied, or from NVD (https://nvd.nist.gov/vuln/detail/) if an analysis is available there, but individual severity ratings at NVD can change over time. If no other information is available, 'High' will normally be assumed.
Apache HTTPD
12.0 027 Apache HTTPD Date: 2023-10-07 Severity: Medium
In httpd-2.4.58, three security vulnerabilities were fixed. Update to 2.4.58. 12.0-027
BIND
12.0 095 BIND Date: 2024-02-13 Severity: High
In BIND-9.18.19, six security vulnerabilities were fixed that could, among other things, crash the service through high CPU utilization, generate out-of-memory errors that could allow BIND to read from other system memory and others. Update to BIND-9.18.24 12.0-095
12.0 011 BIND Date: 2023-09-21 Severity: High
In BIND-9.18.19, two security vulnerabilities were fixed that could allow for a remotely-exploitable denial of service (crash of the named server process) when processing DNS queries. Update to BIND-9.18.19. 12.0-011
CUPS
12.0 009 CUPS Date: 2023-09-21 Severity: High
In CUPS-2.4.7, a security vulnerability was fixed that could allow for remote code execution or denial of service (CUPS service crash) due to a malicious print job. Update to cups-2.4.7. 12.0-009
cURL
12.0 084 cURL Date: 2024-02-01 Severity: Low
In cURL-8.6.0, a security vulnerability was fixed that could allow for an OCSP verification bypass due to TLS session reuse. This vulnerability only applies to connections that use TLS 1.2. Update to cURL-8.6.0. 12.0-084
12.0 053 cURL Date: 2023-12-06 Severity: High
In cURL-8.5.0, two security vulnerabilities were fixed that could allow for cookie hijacking, and could delete HSTS data. Update to cURL-8.5.0. 12.0-053
12.0 024 cURL Date: 2023-10-11 Severity: High
In cURL-8.4.0, two security vulnerabilities were fixed that could allow for cookie injection, and for remote code execution or crashes when using the SOCKS5 proxy feature. Update to cURL-8.4.0. 12.0-024
12.0 007 cURL Date: 2023-09-14 Severity: Medium
In cURL-8.3.0, a security vulnerability was fixed that could allow for a denial of service when processing HTTP headers. The denial of service occurs due to running the cURL process out of memory. Update to cURL-8.3.0. 12.0-007
Exim
12.0 066 Exim Date: 2023-12-29 Severity: Critical
In Exim-4.97.1, a security vulnerability was fixed that allows for SMTP smuggling in certain configurations. Remote attackers can use a publicly available exploit to inject email messages with a spoofed MAIL FROM address, which will allow bypassing the SPF protection mechanisms. Update to Exim-4.97.1. 12.0-066
12.0 025 Exim Date: 2023-10-17 Severity: High
In exim 4.96.1 and 4.96.2 five vulnerabilities, three of which are rated as High, were fixed; update to exim-4.96.2. 12.0-025
Exiv2
12.0 098 Exiv2 Date: 2024-02-13 Severity: Low
In Exiv2-0.28.2, two security vulnerabilities were fixed that could allow for a denial-of-service (application crash and excessive resource consumption) when processing QuickTime Videos. Update to Exiv2-0.28.2. 12.0-098
12.0 038 Exiv2 Date: 2023-11-07 Severity: High
In Exiv2-0.28.1, a security vulnerability was fixed that could allow for arbitrary code execution when reading the metadata from a crafted image file. Update to Exiv2-0.28.1. 12.0-038
FAAD2
12.0 039 FAAD2 Date: 2023-11-08 Severity: High
In FAAD2-2.11.0, two security vulnerabilities were fixed that could allow for remote code execution or denial of service when processing MP4 files. Several other memory safety issues were fixed as well, but were not assigned CVEs. Update to FAAD2-2.11.0 immediately. 12.0-039
Firefox
12.0 104 Firefox Date: 2024-02-20 Severity: High
In firefox 115.8.0 seven vulnerabilities were fixed. Upstream rate three of these as High. 12.0-104
12.0 079 Firefox Revised: 2024-02-08 Severity: High
In firefox 115.7.0 nine vulnerabilities were fixed. Upstream rate the vulnerability in Angle as High, but Angle appears to only be used on MS Windows. Prevously, mozilla rated memory safety bugs as high impact, with this release they now describe them as moderate impact. However, NVD has now analysed that CVE and rates it as High severity. 12.0-079
12.0 057 Firefox Date: 2023-12-19 Severity: High
In firefox 115.6.0 eleven vulnerabilities were fixed. Upstream rate three of these as High. 12.0-057
12.0 046 Firefox Date: 2023-11-21 Severity: High
In firefox 115.5.0 seven vulnerabilities were fixed. Upstream rate five of these as High. 12.0-046
12.0 029 Firefox Date: 2023-10-24 Severity: High
In firefox 115.4.0 six vulnerabilities applicable to linux users were fixed. Upstream rate two of these as High, but two others could lead to a crash and are therefore rated as High by BLFS until there is an external analysis. 12.0-029
12.0 013 Firefox Date: 2023-09-26 Severity: High
In firefox 115.3.0 four vulnerabilities rated as High were fixed, update to Firefox-115.3.0. 12.0-013
GIMP
12.0 040 GIMP Updated: 2023-11-20 Severity: High
In GIMP-2.10.36, four security vulnerabilities were fixed that could allow for remote code execution or denial of service when processing DDS, PSD, or PSP files. Update to GIMP-2.10.36. 12.0-040
GnuPG
12.0 082 GnuPG Date: 2024-01-26 Severity: High
In GnuPG-2.4.4, a security flaw was fixed where Smartcard generation was keeping an unprotected backup copy of the key on disk. Upstream says that all possibly affected users should check whether an unintended copy of a Smartcard key exists and delete it. If you generated a Smartcard using GnuPG-2.4.2, 2.4.3, or 2.2.42, please update to GnuPG-2.4.4 and follow the instructions in the security advisory to check for and remove the unprotected backup keys. 12.0-082
GnuTLS
12.0 070 GnuTLS Date: 2024-01-17 Severity: Medium
In GnuTLS-3.8.3, two security vulnerabilities were fixed that could allow for a timing side-channel attack (leading to the leakage of sensitive data), and for an application crash. Update to GnuTLS-3.8.3 or later. 12.0-070
12.0 045 GnuTLS Date: 2023-11-16 Severity: Medium
In GnuTLS-3.8.2, a security vulnerability was fixed that could allow for a timing side-channel attack. Update to GnuTLS-3.8.2 or later. 12.0-045
gstreamer
12.0 081 gstreamer Date: 2024-01-25 Severity: High
In gst-plugins-bad-1.22.9, a security vulnerability was fixed that could allow for remote code execution or crashes when processing AV1-encoded video files with malformed streams. The vulnerability occurs due to a heap buffer overflow. Update the gstreamer stack to 1.22.9. 12.0-081
12.0 065 gstreamer Date: 2023-12-27 Severity: High
In gst-plugins-bad-1.22.8, a security vulnerability was fixed that could allow for remote code execution or crashes when processing AV1-encoded video files with malformed streams. Update the gstreamer stack to 1.22.8. 12.0-065
12.0 042 gstreamer Date: 2023-11-14 Severity: High
In gst-plugins-bad-1.22.7, two security vulnerabilities were fixed that could allow for crashes or arbitrary code execution. These vulnerabilities can happen when processing MXF or AV1 files, including via web browsers. Update the gstreamer stack to 1.22.7. 12.0-042
12.0 010 gstreamer Date: 2023-09-21 Severity: High
In gst-plugins-bad-1.22.6, three security vulnerabilities were fixed that could allow for arbitrary code execution when processing MXF files or H.265 videos. Update the gstreamer stack to 1.22.6. 12.0-010
ImageMagick
12.0 099 ImageMagick Date: 2024-02-15 Severity: Medium
ImageMagick appears to have become its own CVE Numbering Authority. The changelog between 7.1.1-15 and 7.1.1-28 at ChangeLog.md. mentions at least two GHSA advisories, but those are either missing or inaccessible. 12.0-099
Intel microcode
12.0 043 Intel Microcode Date: 2023-11-15 Severity: High
Intel microcode for some processors has been updated to fix a vulnerability which may allow local privilege escalation, information disclosure, and/or denial of service. Read 12.0-043 for the list of affected processors and how to update the microcode to fix the vulnerabilities.
jasper
12.0 069 jasper Date: 2024-01-12 Severity: High
In jasper-4.1.2, a security vulnerability was fixed that could allow for arbitrary code execution or crashes when processing a crafted image that use the JPEG-2000 codec. Update to jasper-4.1.2. 12.0-069
libarchive
12.0 008 libarchive Date: 2023-09-14 Severity: Medium
In libarchive-3.7.2, multiple security vulnerabilities were fixed that could allow for arbitrary code execution and denial of service when writing a PAX archive using the libarchive API. Update to libarchive-3.7.2. 12.0-008
libnotify
12.0 023 libnotify Date: 2023-10-11 Severity: Low
In libnotify-0.8.3, a security vulnerability was fixed that could allow for a local user to crash an application running if certain parameters were set when generating a notification. Update to libnotify-0.8.3. 12.0-023
Libreoffice
12.0 054 Libreoffice Updated: 2023-12-19 Severity: Critical
In Libreoffice-7.6.4.1, three security vulnerabilites were fixed. One of these was in in the bundled copy of Skia. This vulnerability is identical to the QtWebEngine/Chromium vulnerability that allows for remote code execution by processing an image that is too large for a buffer. In this case, the attack vector would be a malicious image inside of a document. Additionally, a security vulnerability was fixed that could allow for Gstreamer pipeline injection due to improper input validation, and a security vulnerability was fixed that could allow for arbitrary script execution when processing a link's target. Both of these can be exploited when processing documents. Updating to Libreoffice-7.6.4.1 is recommended as soon as possible. 12.0-054
libssh2
12.0 062 libssh2 Date: 2023-12-26 Severity: Critical
In libssh2-1.11.0, a vulnerability has been discovered that allows for silent encryption downgrades due to MITM attacks. This vulnerability has been rated as Critical, and is also known as the "Terrapin" attack. Rebuild libssh2 with the patch in the book as soon as possible. 12.0-062
libuv
12.0 094 libuv Date: 2024-02-13 Severity: Medium
In libuv-1.48.0, a security vulnerability was fixed that could allow for attackers to craft payloads that resolve to unintended IP addresses, which bypass developer checks. Update to libuv-1.48.0. 12.0-094
libX11
12.0 019 libX11 Date: 2023-10-09 Severity: Medium
In libX11-1.8.7, three security vulnerabilities were fixed that could allow for a denial of service (application crash), or for remote code execution on systems where X11 is running as root or on systems with X11 Forwarding enabled. Update to libX11-1.8.7. 12.0-019
libxml2
12.0 087 libxml2 Date: 2024-02-05 Severity: Medium
In libxml2-2.12.5, a security vulnerability was fixed that could allow for a denial-of-service (application crash) when using the XML Reader interface with DTD validation and XInclude expansion enabled. The issue occurs when processing a crafted XML document, and leads to a use-after-free in xmlValidatePopElement. Update to libxml2-2.12.5. 12.0-087
libXpm
12.0 020 libXpm Date: 2023-10-09 Severity: Medium
In libXpm-3.5.17, two security vulnerabilities were fixed that could allow for an attacker to read the contents of memory on a system by opening a malicious XPM image. Update to libXpm-3.5.17. 12.0-020
Libvpx
12.0 017 Libvpx Date: 2023-09-29 Severity: High
Google has announced a security vulnerability in libvpx of which an exploit exists in the wild. Update to (or rebuild) libvpx-1.13.0 with a patch to fix the vulnerability. 12.0-017
Libwebp
12.0 003 Libwebp Date: 2023-09-13 Severity: Critical
Chromium and Apple have announced a Critical vulnerability in libwebp which is being actively exploited. It is fixed in libwebp-1.3.2. Upgrade to libwebp-1.3.2. 12.0-003
Linux-PAM
12.0 073 Linux-PAM Date: 2024-01-18 Severity: Medium
In Linux-PAM-1.6.0, a security vulnerability was fixed that could allow for a local denial of service (crash) when using the pam_namespace.so PAM module. Note that a standard BLFS installation will not use this module, so most systems are unaffected unless a user has added this module into the system on their own. If you use this module, update to Linux-PAM-1.6.0. 12.0-073
MariaDB
12.0 051 MariaDB Date: 2023-12-01 Severity: High
In mariadb-10.11.6 a vulnerability, which allows an attacker with network access to crash (DOS) the server, was fixed. Update to mariadb-10.11.6. 12.0-051
Mutt
12.0 002 Mutt Date: 2023-09-10 Severity: High
In mutt-2.2.12 a vulnerability which could cause mutt to crash while parsing a malformed header was fixed. Update to mutt-2.2.12. 12.0-002
nghttp2
12.0 022 nghttp2 Date: 2023-10-11 Severity: High
In nghttp2-1.57.0, a security vulnerability in the HTTP/2 protocol was fixed that allows for a remotely exploitable denial of service attack. This vulnerability is being exploited in the wild to trigger Distributed Denial of Service attacks against various services. Update to nghttp2-1.57.0, especially if you run a web server. 12.0-022
node.js
12.0 026 node.js Date: 2023-10-22 Severity: High
In node.js-18.18.2, four vulnerabilities were fixed, of which two are rated as High. One of those is in the shipped version of nghttp2, so if you follow the book using system nghttp2 you should update nghttp to 1.57.0 12.0-022 as well as updating to node.js-18.18.2. 12.0-026
12.0 102 node.js Date: 2024-02-17 Severity: High
In node.js-20.11.1, eight vulnerabilities were fixed, some of which were ranked high. Update to node.js-20.11.1. 12.0-102
NSS
12.0 100 NSS Date: 2024-02-16 Severity: Medium
In NSS-3.98, a security vulnerability was fixed that could allow for RSA cryptography information to be leaked, such as whether the high order bits of the RSA decryption result are zero. This information can be used to mount a Bleichenbacher or Manger attack against all RSA decryption operations. Update to NSS-3.98. 12.0-100
OpenJDK
12.0 074 OpenJDK Date: 2024-01-20 Severity: High
In OpenJDK-21.0.2, five security vulnerabilities have been fixed in the Hotspot and Security components that could allow for unauthorized creation, modification, and deleation of data on a system, as well as for information disclosure, denial of service, and remote code execution. Four of these vulnerabilities require no privileges or user interaction, and are primarily exploitable over the network. One is exploitable locally but requires some privileges, though still no user interaction. Update to OpenJDK-21.0.2. 12.0-074
12.0 036 OpenJDK Date: 2023-11-02 Severity: Medium
In OpenJDK-21.0.1, two security vulnerabilities were fixed that could allow for a remote attacker to modify, add, or delete data that a Java application has access to, as well as for a remote attacker to cause a denial of service. Update to OpenJDK-21.0.1. 12.0-036
OpenLDAP
12.0 088 OpenLDAP Date: 2024-02-05 Severity: High
In OpenLDAP-2.6.7, a security vulnerability was fixed that could allow for an attacker to malform an LDAP search query thereby giving them a higher access mask than they should have. Update to OpenLDAP-2.6.7 or later. 12.0-088
OpenSSH
12.0 061 OpenSSH Date: 2023-12-26 Severity: Critical
In OpenSSH-9.6p1, two security vulnerabilities were fixed that could allow for a MITM attack to cause a silent encryption downgrade, and for arbitrary command injection in some circumstances (such as when using git submodules). The MITM attack is rated as Critical and has been codenamed the 'Terrapin' attack. Update to OpenSSH-9.6p1 or later. 12.0-061
Postfix
12.0 078 Postfix Date: 2024-01-23 Severity: Critical
In Postfix-3.8.5 (and 3.7.10, 3.6.14, and 3.5.24), improvements to the fix for CVE-2023-51764 (SMTP smuggling) were made that allow for more compatibility with some existing SMTP clients and for better logging. In addition, patches are now available for some unsupported versions of Postfix. For most users, the fixes in Postfix-3.8.4 (and 3.7.9, 3.6.13, and 3.5.24) will be sufficient, but if you encounter problems, upgrading to these improved versions is highly recommended. 12.0-078.
12.0 067 Postfix Date: 2023-12-29 Severity: Critical
In Postfix-3.8.4 (as well as 3.7.9, 3.6.13, and 3.5.23), a security vulnerability was fixed that allows for SMTP smuggling on public-facing mail servers. Remote attackers can use a publicly available exploit to inject email messages with a spoofed MAIL FROM address, which also allows bypassing SPF protection mechanisms. Update to Postfix-3.8.4 (or one of 3.7.9, 3.6.13, and 3.5.23) as soon as possible if you operate a public facing mail server, and apply the required configuration changes. See 12.0-067 for more details.
PostgreSQL
12.0 090 PostgreSQL Date: 2024-02-09 Severity: High
In PostgreSQL-16.2 a vulnerability was fixed that could allow for arbitrary command execution through luring a user into running a command (check the CVE for the command). Due to this it is highly recommended to update to PostgreSQL on any older system. 12.0-090
PostgreSQL
12.0 041 PostgreSQL Date: 2023-11-10 Severity: High
In PostgreSQL-16.1 (and 15.5), three security vulnerabilities were fixed that could allow for memory and information disclosure, arbitrary code execution, signaling superuser processes, and denial of service. It is highly recommended to update PostgreSQL as soon as possible due to the arbitrary code execution and memory/information disclosure vulnerabilities. Update to PostgreSQL-16.1 (or 15.5 if you wish to stay on 15). 12.0-041
ProFTPD
12.0 060 ProFTPD Date: 2023-12-23 Severity: Critical
In ProFTPD 1.3.8b the 'Terrapin' SSH vulnerability, was fixed. This could allow for an attacker to downgrade the connection to a lesser security level resulting in reduced security and allowing an attacker to login to a victim's client. It is highly recommended to recommended to update ProFTPD as soon as possible due to the broad attack surface of this vulnerability. 12.0-060
Python3
12.0 092 Python3 Date: 2024-02-13 Severity: High
In Python-3.12.2, a security vulnerability was fixed that could allow for silent execution of arbitrary code via hidden *.pth files. *.pth files are executed automatically, unlike normal Python files which need explicit importing or passing as an argument to the Python interpreter. The issue was fixed upstream by skipping *.pth files with names starting with a dot (or the hidden file attribute on other systems). Update to Python-3.12.2, or 3.11.8 if you prefer to stay on the 3.11.x series. 12.0-092
12.0 001 Python3 Date: 2023-09-03 Severity: Medium
In Python-3.11.5, a security vulnerability was fixed that could allow to bypass TLS handshake in SSL sockets. Update to python-3.11.5. 12.0-001
Qt5
12.0 101 Qt5 Date: 2024-02-17 Severity: High
In Qt5-5.15.12, a security vulnerability was discovered that could allow for a buffer overflow when reading a crafted KTX image file. This issue exists in qtbase, and will lead to a denial of service or possibly other impacts when reading the crafted file in an application. Rebuild Qt5 (or qt5-alternate) with the patch. 12.0-101
Qt6
12.0 103 Qt6 Date: 2024-02-18 Severity: Critical
In Qt6-6.6.2, two security vulnerabilities were fixed that could allow for a denial of service and arbitrary code execution. One of these issues occurs when loading KTX images, and is classified as a buffer overflow. The other vulnerability is classified as an integer overflow and is in the HTTP/2 implementation in QtBase. Due to the severity of the HTTP/2 issue, it is recommended that you update this package immediately if you have it installed. Update to Qt6-6.6.2. 12.0-103
QtWebEngine
12.0 048 QtWebEngine Date: 2023-12-01 Severity: Critical
In QtWebEngine-5.15.17, nine security vulnerabilities were fixed that could allow for remotely exploitable crashes and remote code execution. One of these vulnerabilities is under active exploitation and can be triggered when rendering any web page that contains an image or other 2D content. Update to QtWebEngine-5.15.17 immediately to protect your system. 12.0-048
12.0 033 QtWebEngine Date: 2023-10-30 Severity: High
In QtWebEngine-5.15.16, fixes for eight Chromium security vulnerabilities were backported to the branch. All are rated as High. 12.0-033
Samba
12.0 021 Samba Date: 2023-10-11 Severity: High
In samba-4.19.1, several security vulnerabilities were fixed that could allow for an attacker to trigger denial of service, crashing the service, or potentially compromising it. Update to samba-4.19.1. 12.0-021
Seamonkey
12.0 059 Seamonkey Date: 2023-12-20 Severity: High
In Seamonkey-2.53.18, several security vulnerabilities were fixed that could allow for clickjacking, address bar spoofing, crashes, extensions opening arbitrary URLs, out-of-bounds memory access, clipboard contents stealing, and path traversal. Update to Seamonkey-2.53.18. 12.0-059
12.0 028 Seamonkey Date: 2023-10-24 Severity: High
Seamonkey-2.53.17.1 ships an old version of libvpx with a different API from current libvpx, preventing use of system libvpx. The recent public vulnerability has led upstream to commit fixes for several libvpx issues, but they have not yet been able to complete a new release. Update to Seamonkey-2.53.17.1 plus the consolidated_fixes-1.patch. 12.0-028
12.0 014 Seamonkey Date: 2023-09-27 Severity: High
In Seamonkey-2.53.17.1, several security vulnerabilities were fixed that could allow for fullscreen window spoofing, denial of service, remote code execution, URL spoofing, push notifications being saved to disk unencrypted, and certificate exception bypasses. This update brings Seamonkey up to date with the security fixes in Firefox 115.3.0 and Thunderbird 115.3.0. Update to Seamonkey-2.53.17.1. 12.0-014
sendmail
12.0 086 sendmail Date: 2024-02-02 Severity: Critical
In sendmail-8.18.2, a security vulnerability was fixed that allows for SMTP smuggling on publicly-accessible mail servers. Remote attackers can use a publicly available exploit to inject email messages with a spoofed MAIL FROM address, which also allows bypassing SPF protection mechanisms. Update to sendmail-8.18.2 if you maintain a publicly-accessible mail server. 12.0-086
SpiderMonkey
12.0 064 SpiderMonkey Date: 2023-12-27 Severity: High
In SpiderMonkey/mozjs-115.6.0, a security vulnerability was fixed that could allow for memory safety issues. This vulnerability could allow for arbitrary code execution and crashes due to memory corruption. Update to SpiderMonkey-115.6.0. 12.0-064
12.0 030 SpiderMonkey Date: 2023-10-24 Severity: High
In the Javascript code of firefox-115.4.0 there is a fix for a potential crash. Upstream rate this as Medium, But BLFS rates it as High pending external analysis. 12.0-030
systemd
12.0 068 systemd Date: 2023-12-30 Severity: Medium
A security vulnerability was found in systemd-resolved that could allow systemd-resolved to accept records of DNSSEC-signed domains, even when they have no signature. Note that you must have DNSSEC support enabled on your system to be vulnerable to this vulnerability, and that support is not turned enabled by default. If you do have DNSSEC support enabled, rebuild systemd with the new 'sed' using the instructions from BLFS. If you do not have DNSSEC support enabled, no action is necessary. 12.0-068
Thunderbird
12.0 105 Thunderbird Date: 2024-02-21 Severity: High
In Thunderbird-115.8.0, several security vulnerabilities were fixed that could allow for spoofing, notifications being hidden, obscuring the permissions dialog, unintentional permission granting, response header injection, and for arbitrary code execution. Update to Thunderbird-115.8.0. 12.0-105
12.0 080 Thunderbird Date: 2024-01-24 Severity: High
In Thunderbird-115.7.0, nine security vulnerabilities were fixed that could allow for remotely exploitable crashes, arbitrary code execution, HSTS policy bypasses, privilege escalation, permissions request bypassing, phishing, and a bypass of the Content Security Policy if one is set. Update to Thunderbird-115.7.0. 12.0-080
12.0 063 Thunderbird Date: 2023-12-26 Severity: High
In Thunderbird-115.6.0, eleven security vulnerabilities were fixed that could allow for remote code execution, exploitable crashes, sandbox escapes, S/MIME signatures being accepted despite mismatching message dates, undefined behavior, and for spoofed messages to be accepted when processing PGP/MIME payloads. Update to Thunderbird-115.6.0. 12.0-063
12.0 047 Thunderbird Date: 2023-11-22 Severity: High
In Thunderbird-115.5.0, seven security vulnerabilities were fixed that could allow for remote code execution, remotely exploitable crashes, clickjacking when permission prompts are presented to the user, memory data leakage onto a canvas, and for text to be copied into the primary selection unexpectedly when running under X11. Update to Thunderbird-115.5.0. 12.0-047.
12.0 037 Thunderbird Date: 2023-11-02 Severity: High
In Thunderbird-115.4.1, six security vulnerabilities were fixed that could allow for remotely exploitable crashes, arbitrary code execution, clickjacking, address bark spoofing, and for extensions to open arbitrary URLs in the background. Update to Thunderbird-115.4.1. 12.0-037.
12.0 015 Thunderbird Date: 2023-09-27 Severity: High
In Thunderbird-115.3.0, three security vulnerabilities were fixed that could allow for remotely exploitable crashes and arbitrary code execution. Note that these vulnerabilities only apply when using HTML mail. Update to Thunderbird-115.3.0. 12.0-015
12.0 006 Thunderbird Date: 2023-09-14 Severity: Critical
In Thunderbird-115.2.2, a critical security vulnerability in the bundled libwebp was fixed which could allow for remote code execution when loading a malicious HTML mail which contains a webp image embedded in it. The version of Thunderbird shipped with BLFS 12.0 was configured to use the bundled version of libwebp, however it has been changed in the development book to use the system version of libwebp. It is recommended that you update to the patched version of libwebp and that you upgrade Thunderbird immediately to protect your system. 12.0-006
Unbound
12.0 096 Unbound Date: 2023-09-27 Severity: High
In Unbound-1.19.1, two security vulnerabilities were fixed that could allow for crashing the instance through CPU exhaustion Update to Unbound-1.19.1. 12.0-096
tracker-miners
12.0 034 tracker-miners Updated: 2023-11-02 Severity: High
In tracker-miners-3.6.1, a security vulnerability was fixed that allows for a sandbox escape. This vulnerability will allow a maliciously crafted file to execute code outside of the sandbox if the tracker-extract process has been compromised by a vulnerability in another package. Update to tracker-miners-3.6.2 and it's dependency tracker-3.6.0, or alternatively update to tracker-miners-3.5.4. 12.0-034
WebKitGTK
12.0 089 WebKitGTK Date: 2024-02-05 Severity: Critical
In WebKitGTK-2.42.5, three security vulnerabilities were fixed that could allow for trivial remote code execution and for a webpage to fingerprint a user. Due to the remote code execution vulnerabilities it is recommended that you update WebKitGTK immediately to protect your system. Update to WebKitGTK-2.42.5. 12.0-089
12.0 058 WebKitGTK Date: 2023-12-19 Severity: Medium
In WebKitGTK-2.42.4, a security vulnerability was fixed that could allow for an application crash when processing a large SVG image. The issue was resolved with improved memory handling. Update to WebKitGTK-2.42.4 or later. 12.0-058
12.0 052 WebKitGTK Date: 2023-12-06 Severity: Critical
In WebKitGTK-2.42.3, two security vulnerabilities were fixed that could allow for information disclosure and arbitrary code execution. Both of these vulnerabilities are exploitable when processing crafted web content, and are known to be actively exploited. Update to WebKitGTK-2.42.3 or later immediately to protect your system. 12.0-052
12.0 044 WebKitGTK Date: 2023-11-16 Severity: High
In WebKitGTK+-2.42.2, two security vulnerabilities were fixed those could lead to denial of service and remote code execution when processing crafted web content. Update to WebKitGTK+-2.42.2 or later immediately to protect your system. 12.0-044
12.0 016 WebKitGTK+ Date: 2023-09-27 Severity: Critical
In WebKitGTK+-2.42.1, a critical security vulnerability was fixed that could lead to remote code execution when processing crafted web content. The vulnerability was resolved with additional checks when processing JavaScript. Apple is aware of reports that this vulnerability is being actively exploited, and does not require any user interaction to exploit. Update to WebKitGTK+-2.42.1 or later immediately to protect your system. 12.0-016
wpa_supplicant
12.0 097 wpa_supplicant Date: 2024-02-13 Severity: High
In wpa_supplicant-2.10, a security vulnerability was discovered that could allow for an attacker to trick a victim into connecting to a malicious clone of an enterprise WiFi network, and in turn allow them to intercept all traffic. The BLFS developers have created a patch for this vulnerability based upon an upstream fix. 12.0-097
xdg-utils
12.0 093 xdg-utils Date: 2024-02-13 Severity: Medium
In xdg-utils-1.2.1, a security vulnerability was fixed that could allow for attachments to be discretely added to emails sent via the 'xdg-email' command. Update to xdg-utils-1.2.1. 12.0-093
Xorg-server
12.0 071 xorg-server Date: 2024-01-17 Severity: Medium
In xorg-server-21.1.11, four security vulnerabilities were fixed that could allow for crashes, privilege escalation, and remote code execution on systems where X11 forwarding is in use. These vulnerabilities are classified as heap buffer overflows and out-of-bounds memory accesses. Update to xorg-server-21.1.11. 12.0-071
12.0 055 xorg-server Updated: 2023-12-15 Severity: High
In xorg-server-21.1.10, two security vulnerabilities were fixed that could allow for privilege escalation and memory disclosure. If you are using SSH X Forwarding, these vulnerabilities could be used for remote code execution. Update to xorg-server-21.1.10 12.0-055
12.0 032 xorg-server Updated: 2023-10-29 Severity: High
In xorg-server-21.1.9 a security vulnerability was fixed due to an out-of-bounds write flaw, leading to privilege escalation or denial of service. Update to xorg-server-21.1.9. 12.0-032
12.0 031 xorg-server Updated: 2023-10-29 Severity: Low
In xorg-server-21.1.9 a security vulnerability was fixed that could allow an X server crash in a very specific and legacy configuration. Update to xorg-server-21.1.9. 12.0-031
Xwayland
12.0 072 Xwayland Date: 2024-01-17 Severity: Medium
In Xwayland-23.2.4, four security vulnerabilities were fixed that could allow for crashes and privilege escalation. These vulnerabilities are classified as heap buffer overflows and out-of-bounds memory accesses. Update to Xwayland-23.2.4. 12.0-072
12.0 056 Xwayland Date: 2023-12-15 Severity: High
In Xwayland-23.2.3, two security vulnerabilities were fixed due to out-of-bounds reads and writes, leading to privilege escalation and information disclosure. Update to Xwayland-23.2.3. 12.0-056
12.0 032 xwayland Updated: 2023-10-29 Severity: High
In xwayland-23.2.2 a security vulnerability was fixed due to an out-of-bounds write flaw, leading to privilege escalation or denial of service. Update to xwayland-23.2.2. 12.0-032