BLFS Security Advisories for BLFS 12.1.

BLFS-12.1 was released on 2024-03-01

This page is in alphabetical order of packages, and if a package has multiple advisories the newer come first.

The links at the end of each item point to more details which have links to the released books.

In general, the severity is taken from upstream, if supplied, or from NVD (https://nvd.nist.gov/vuln/detail/) if an analysis is available there, but individual severity ratings at NVD can change over time. If no other information is available, 'High' will normally be assumed.

Apache HTTPD

12.1 067 Apache HTTPD Date: 2024-07-04 Severity: High

In httpd-2.4.61, eight security vulnerabilities were fixed. 12.1-067

12.1 023 Apache HTTPD Date: 2024-04-08 Severity: High

In httpd-2.4.59, three security vulnerabilities were fixed that could allow for denial-of-service and HTTP Response Splitting. One of these vulnerabilities is the "HTTP/2 CONTINUATION attack", and allows for remotely exploitable memory exhaustion. Update to httpd-2.4.59 immediately to protect yourself against the "HTTP/2 CONTINUATION" attack. 12.1-023

BIND

12.1 080 BIND Date: 2024-07-23 Severity: High

In BIND-9.18.28, four security vulnerabilities were fixed that could allow for an attacker to remotely crash the DNS server. Note that this only impacts the server, and not the utilities. One of these vulnerabilities is in the SIG0 support, which was removed entirely in this release. All users who run a publicly accessible DNS server are advised to upgrade to this release as soon as possible. Update to BIND-9.18.28. 12.1-080

c-ares

12.1 002 c-ares Date: 2024-03-02 Severity: Medium

In c-ares-1.27.0, a security vulnerability was fixed that could allow for a crash when reading a malformed /etc/resolv.conf, /etc/nsswitch.conf, or HOSTALIASES files. Update to c-ares-1.27.0. 12.1-002

cryptsetup

12.1 065 cryptsetup Updated: 2024-07-10 Severity: High

In cryptsetup-2.7.3, a security vulnerability was fixed that could result in a drive being partially decrypted, or cause it's data to be destroyed. Update to cryptsetup-2.7.3. 12.1-065

CUPS

12.1 062 CUPS Date: 2024-06-12 Severity: Medium

In CUPS-2.4.9, a security vulnerability was fixed that could allow for privilege escalation and allows for world-writable files in special configurations. If a Listen option in the configuration files point to a symbolic link, CUPS will perform an arbitrary chmod to 0140777 of that location. Update to CUPS-2.4.9 if you use this configuration. 12.1-062

cURL

12.1 084 cURL Date: 2024-07-31 Severity: Low

In cURL-8.9.1, a security vulnerability was fixed that could allow for a crash or potentially leaking the contents of heap memory to the application when CURLINFO_CERTINFO is used. Update to cURL-8.9.1 12.1-084

12.1 081 cURL Date: 2024-07-24 Severity: Medium

In cURL-8.9.0, a security vulnerability was fixed that could allow for a crash that occurs when a server provides a specially crafted TLS certificate. This occurs in the utf8asn1str() function in the ASN.1 parser. Note that in some circumstances where the malloc implementation does not detect this error, this could potentially allow for remote code execution. Update to cURL-8.9.0. 12.1-081

12.1 015 cURL Date: 2024-03-27 Severity: Medium

In cURL-8.7.1, a security vulnerability was fixed that could allow for a crash due to leaked memory after an aborted HTTP/2 server push. Update to cURL-8.7.1. 12.1-015

Dovecot

12.1 093 Dovecot Date: 2024-08-16 Severity: High

In Dovecot-2.3.19.1, two security vulnerabilities were fixed that could allow for resource exhaustion when processing large email headers. One of these issues happens when eeeessing very large email headers, while the other issue occurs when there are a large number of Address headers in particular. Update to Dovecot-2.3.19.1. 12.1-093

Emacs

12.1 071 Emacs Date: 2024-07-10 Severity: High

In Emacs-29.4, a security vulnerability was fixed that could allow for arbitrary shell commands to be run while in Org mode (the built-in email client). There is a public proof of concept available, and this vulnerability is trivial to exploit. If you are using the Org mode in Emacs, you need to update Emacs immediately. Update to Emacs-29.4. 12.1-071

12.1 014 Emacs Date: 2024-03-26 Severity: High

In Emacs-29.3, four security vulnerabilities were fixed that could allow for arbitrary Lisp code execution, arbitrary code execution via displaying a LaTeX preview for email attachments, and for untrusted content to be displayed in Org mode and when processing emails. If you use Emacs for displaying email or use the Org functionality for document editing, formatting, or organizing, you should update to Emacs-29.3 immediately. 12.1-014

Exiv2

12.1 078 Exiv2 Date: 2024-07-19 Severity: Low

In Exiv2-0.28.3, a security vulnerability was fixed that could allow for a denial of service (out-of-bounds read) when parsing the metadata of a crafted ASF video file. Update to Exiv2-0.28.3. 12.1-078

Firefox

12.1 086 Firefox Date: 2024-08-07 Severity: High

In Firefox-128.1.0esr (or 115.14.0), twelve security vulnerabilities were fixed that could allow for fullscreen notification dialogs to be obscured, remote code execution, information disclosure, sandbox escapes, remotely exploitable crashes, cross-site scrripting, content security policy bypasses, permission bypasses, security prompt obscuring, and for accidental decryption of data (on Sandy Bridge processors). Update to Firefox-128.1.0esr (or 115.14.0). 12.1-086

12.1 074 Firefox Date: 2024-07-12 Severity: High

In Firefox-128.0esr (and 115.13.0esr), several security vulnerabilities were fixed that could alow for remote code execution, user confusion allowing for unauthorized permissions to be granted, moving the cursor outside of the Firefox window, crashes, blocking exit from fullscreen mode, Content Security Policy bypasses, and for cookies to be sent inadvertedly. Update to Firefox-128.0esr (or 115.13.0esr). 12.1-074

12.1 063 Firefox Date: 2024-06-12 Severity: High

In Firefox-115.12.0esr, seven security vulnerabilities were fixed that could allow for potentially exploitable crashes, sandbox restriction bypasses, leakage of external protocol handlers, memory corruption, remote code execution, and cross-origin image leaks. Update to Firefox-115.12.0esr. 12.1-063

12.1 052 Firefox Date: 2024-05-31 Severity: High

In Firefox-115.11.0esr, six security vulnerabilities were fixed that could allow for arbitrary code execution, arbitrary JavaScript execution, potential permissions bypasses, cross-origin reponse leakage, and crashes when saving pages to PDFs. Update to Firefox-115.11.0esr. 12.1-052

12.1 032 Firefox Date: 2024-04-17 Severity: High

In Firefox-115.10.0esr, eight security vulnerabilities were fixed that could allow for arbitrary code execution, remotely exploitable denial of service conditions (using HTTP/2 CONTINUATION frames), remotely exploitable crashes, and clickjacking. Some of these vulnerabilities occur when using the JIT compiler, but one of the vulnerabilities is 32-bit specific and allows for an Integer Overflow when processing a crafted OpenType font. Updating Firefox is recommended due to the HTTP/2 CONTINUATION attack. Update to Firefox-115.10.0esr. 12.1-032

12.1 013 Firefox Date: 2024-03-22 Severity: Critical

In firefox 115.9.1 one critical vulnerability revealed at this week's pwn2own was fixed. Update to firefox-115.9.1. 12.1-013

12.1 008 Firefox Date: 2024-03-19 Severity: High

In firefox 115.9.0 eight vulnerabilities applicable to linux X86 were fixed. Update to firefox-115.9.0. 12.1-008

FontForge

12.1 028 FontForge Date: 2024-04-15 Severity: Medium

In FontForge-20230101, two security vulnerabilities were discovered that could allow for Command Injection via malicious filenames and malicious archives. The vulnerabilities were resolved via modifying the code to use the g_spawn_sync/async() functions instead of the system() functions, which causes commands to not be executed through a shell. Rebuild FontForge with the patch using the instructions in the book. 12.1-028

gdk-pixbuf

12.1 042 gdk-pixbuf Date: 2024-05-22 Severity: High

In gdk-pixbuf-2.42.12, a security vulnerability was fixed that could allow for heap memory corruption (and thus arbitrary code execution or a crash) when processing chunks in a crafted ANI file. ANI files are Animated Cursors for Windows, but can be indexed by Tracker and can be viewed in some applications. Update to gdk-pixbuf-2.42.12. 12.1-042

ghostscript

12.1 043 ghostscript Date: 2024-05-22 Severity: High

In ghostscript-10.03.1, five security vulnerabilities were fixed that could allow for crashes, shell injection, and remote code execution when processing PostScript files (including print jobs). Update to ghostscript-10.03.1. 12.1-043

12.1 006 ghostscript Date: 2024-03-09 Severity: High

In ghostscript-10.03.0, a security vulnerability was fixed that could allow for arbitrary code execution in the shipped fork of the tesseract library used for OCR. 12.1-006

giflib

12.1 001 giflib Date: 2024-03-02 Severity: High

In giflib-5.2.2, two security vulnerabilities were fixed that could allow for a local attacker to obtain sensitive information and for a crash. These vulnerabilities exist in the DumpScreen2RGB() function in the gif2rgb utility. Update to giflib-5.2.2 if you use the gif2rgb utility. 12.1-001

Git

12.1 038 Git Date: 2024-05-15 Severity: Medium

In git-2.45.0, four security vulnerability were fixed that allowed a maliciously crafted repository execute malicious code at cloning time and create hardlinks to files outside the cloned repository. Update to git-2.45.1 12.1-038

glib2

12.1 044 glib2 Date: 2024-05-22 Severity: Medium

In glib-2.80.2, a security vulnerability was fixed that could allow for unicast spoofing to occur with services that use GDBus. This includes several system services, including NetworkManager and others. This allows for other users of a shared computer to send spoofed D-Bus signals which a GDBus-based client will incorrectly interpret as having been sent by the trusted system service, which will cause incorrect behavior with an application-dependent impact. Update to glib-2.80.2. 12.1-044

gnutls

12.1 012 gnutls Date: 2024-03-23 Severity: Medium

In gnutls-3.8.4, two security vulnerabilities were fixed. One fixed a bug where certtool crashed when verifying a certificate chain with more than 16 certificates and the other fixes a side-channel in the deterministic ECDSA. Update to gnutls-3.8.4. 12.1-012

gstreamer

12.1 039 gstreamer Date: 2024-05-22 Severity: High

In gst-plugins-base-1.24.3, a security vulnerability was fixed that could allow for a heap-based buffer overflow in the EXIF image tag parser when processing a certain malformed file. This would allow a malicious third party to trigger a crash in the application, as well as achieve code execution through heap manipulation. Update the gstreamer stack to 1.24.3. 12.1-039

GTK+-3

12.1 073 GTK+-3 Date: 2024-07-12 Severity: Medium

In GTK+-3.24.43, a security vulnerability was fixed that could allow for library injection from the current working directory if certain environment variables were set. Update to GTK+-3.24.43. 12.1-073

idna (Python Module)

12.1 089 idna (Python Module) Date: 2024-08-12 Severity: High

In idna-3.7, a security vulnerability was fixed that could allow for a specially crafted invalid input to cause an exceptionally large amount of resource consumption, increasing quadratically depending on the complexity of the input. This applies to the idna.encode() function. Update to idna-3.7. 12.1-089

Intel microcode

12.1 045 Intel Microcode Date: 2024-05-24 Severity: High

In intel-microcode-20240514, four hardware vulnerabilities are fixed. One of them may allow for a denial of service when using Intel Core Ultra processors that belong to the Meteor Lake platform due to an invalid sequence of processor instructions. Another one of these vulnerabilities allows for information disclosure in certain circumstances due to race conditions in hardware logic. This impacts processors that belong to the Meteor Lake (Intel Core Ultra family) as well as the Alder Lake, Raptor Lake, and Arizona Beach processors. This includes the 12th Generation family of Intel CPUs as well as the 13th Generation, the Intel Core Processor N family, the Pentium Gold Processor Family, and the Atom C Series of processors. The other security vulnerabilities impact Intel Xeon Scalable servers with Trust Domain Extensions support. In this case, an elevation of privileges may occur. Update to intel-microcode-20240514 if your processor is affected. 12.1-045

12.1 017 Intel Microcode Date: 2024-03-20 Severity: Medium

Intel microcode for some processors has been updated to fix two hardware vulnerabilities which may allow a denial of service via remote access, or an information disclosure via local access. Read 12.1-017 for the list of affected processors and how to update the microcode and the kernel to mitigate the vulnerability.

12.1 009 Intel Microcode Date: 2024-03-20 Severity: Medium

Intel microcode for some processors has been updated to provide a mitigation for an hardware vulnerability known as RFDS, or Register File Data Sampling, which may allow an information disclosure if the attacker can run code locally. Read 12.1-009 for the list of affected processors and how to update the microcode and the kernel to mitigate the vulnerability.

libaom

12.1 061 libaom Date: 2024-06-12 Severity: High

In libaom-3.9.1, a security vulnerability was fixed that could allow for arbitrary code execution when playing a crafted video file. This is primarily exploitable remotely via web browsers. Update to libaom-3.9.1. 12.1-061

libarchive

12.1 036 libarchive Date: 2024-04-30 Severity: High

In libarchive-3.7.4, a security vulnerability was fixed that could allow for remote code execution when processing a crafted RAR archive due to an Out-Of-Bounds read. It happens in the RAR e8 filter, and occurs when the archive is decompressed or when it is viewed. Update to libarchive-3.7.4. 12.1-036

12.1 025 libarchive Date: 2024-04-10 Severity: Medium

In libarchive-3.7.3, a possible security vulnerability was fixed that could allow for command injection via terminal escape sequences when decompressing or viewing an archive. Update to libarchive-3.7.3. 12.1-025

Libreoffice

12.1 059 Libreoffice Date: 2024-06-07 Severity: High

In Libreoffice-24.2.4.2, a security vulnerability was fixed that could allow for unchecked script execution in the Graphics on-click binding. This allows an attacker to create a document which, without prompt, will execute scripts built-into the document when clicking on graphics. Two additional bugs were fixed that could cause crashes. Update to Libreoffice-24.2.4.2. 12.1-059

libvpx

12.1 056 libvpx Date: 2024-06-04 Severity: Medium

In libvpx-1.14.1, a security vulnerability was fixed that could allow for integer overflows in the calculations of buffer sizes and offsets when calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameters. This may result in invalid fields being returned in the vpx_image_t struct, and can cause a denial of service or remote code execution. Update to libvpx-1.14.1. 12.1-056

libxml2

12.1 083 libxml2 Date: 2024-07-25 Severity: Critical

In libxml2-2.13.3, a security vulnerability was fixed that could allow for XML External Entity injection attacks. This was noted in at least one downstream project, but further details aren't available to the public at the time of this advisory. Update to libxml2-2.13.3. 12.1-083

12.1 040 libxml2 Date: 2024-05-22 Severity: Low

In libxml2-2.12.7, a security vulnerability was fixed that could allow for a buffer over-read when formatting error messages with 'xmllint --htmlout'. Update to libxml2-2.12.7. 12.1-040

MariaDB

12.1 054 MariaDB Date: 2024-05-31 Severity: Medium

In MariaDB-10.11.8, a security vulnerability was fixed that could allow for unauthorized creation, modification, or deletion of data stored in a MySQL instance. Update to MariaDB-10.11.8. 12.1-054

MIT Kerberos V5

12.1 072 MIT Kerberos V5 Date: 2024-07-10 Severity: High

In MIT Kerberos V5 1.21.3, two security vulnerabilities were fixed that could allow for an attacker to modify the plaintext Extra Count field of a confidential GSS token, and for an attacker to cause invalid memory reads during GSS message token handling (by sending messages with invalid length fields). Updating is recommended if you are using the server component. Update to MIT Kerberos V5 1.21.3. 12.1-072

nghttp2

12.1 022 nghttp2 Date: 2024-04-08 Severity: Medium

In nghttp2-1.61.0, a security vulnerability was fixed that could allow for an denial-of-service (excessive CPU usage and OOM crash) because nghttp2 continues reading an unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. Update to nghttp2-1.61.0 or later especially if you host a server. 12.1-022

Node.js

12.1 019 Node.js Date: 2024-04-07 Severity: High

In Node.js-20.12.1, two security vulnerabilities were fixed that could allow for a server crash or bad http requests through obfuscation of content length. Update to Node.js-20.12.1 or later. 12.1-019

12.1 034 Node.js Date: 2024-04-20 Severity: Low

In Node.js-20.12.2, a vulnerabilty was fixed where command injection could be performed, so far this is only known to affect Windows hosts. Regardless updating is advised. 12.1-034

12.1 075 Node.js Date: 2024-07-14 Severity: Medium

In Node.js-20.15.1, three security vulernabilities were fixed that could allow for changing file permissions, reading files users aren't allowed to read, or bypassing the security of the URL bar search parameters. Update to Node.js-20.15.1 or later. 12.1-075

OpenJDK

12.1 082 OpenJDK Date: 2024-07-25 Severity: High

In OpenJDK-22.0.2, five security vulnerabilities were fixed that could allow for unauthorized modification, disclosure, and deletion of data accessible by OpenJDK. Four of these vulnerabilities are present in the Hotspot component, and the other vulnerability is present in the 2D component. All of these are exploitable remotely and without authentication. Update to OpenJDK-22.0.2. 12.1-082

12.1 049 OpenJDK Date: 2024-05-29 Severity: High

In OpenJDK-22.0.1, four security vulnerabilities were fixed that could allow for a denial of service (application crash) or for unauthorized reading, modification, and deletion of data. These vulnerabilities are all network exploitable with no authentication or user interaction required, and they are in the Hotspot and Networking components. Update to OpenJDK-22.0.1. 12.1-049

OpenJPEG

12.1 003 OpenJPEG Date: 2024-03-02 Severity: High

In OpenJPEG-2.5.2, a security vulnerability was fixed that could allow for arbitrary code execution with the permissions of the application which uses OpenJPEG. Update to OpenJPEG-2.5.2. 12.1-003

OpenSSH

12.1 066 OpenSSH Date: 2024-07-02 Severity: Critical

In OpenSSH-9.8p1, a security vulnerability was fixed that could allow for arbitrary code execution with root privilleges bypassing authentication. Update to OpenSSH-9.8p1 or set LoginGraceTime to 0 in /etc/ssh/sshd_config. 12.1-066

p7zip

12.1 094 p7zip Date: 2024-08-20 Severity: High

In p7zip-17.04, two security vulnerabilities were discovered that could allow for remote code execution via buffer overflows and out-of-bounds reads when processing NTFS volumes. Apply the patch to p7zip as soon as possible if you process NTFS volumes using p7zip. 12.1-094

PHP

12.1 057 PHP Date: 2024-06-07 Severity: Critical

In PHP-8.3.8, four security vulnerabilities were fixed that could allow for argument injection when using CGI, for a filter bypass in filter_var FILTER_VALIDATE_URL, for a OpenSSL Marvin Attack, and for operating system command injection. The Operating System Command Injection and Argument Injection vulnerabilities are known to be actively exploited, and proof of concept exploits are available to the public. It is recommended that you update PHP immediately if you are running it on a public-facing web server. Update to PHP-8.3.8. 12.1-057

12.1 030 PHP Date: 2024-04-17 Severity: High

In PHP-8.3.6, three security vulnerabilities were fixed that could allow for insecure cookies to be set and thus a bypass of __Host/__Secure cookies, as well as for an attacker to trivially compromise a victim's account if a password is started with a null byte, and for an infinite loop when using the mb_encode_mimeheader function with certain crafted inputs. If you use PHP to run a website that accepts passwords, you should update immediately. Update to PHP-8.3.6. 12.1-030

plasma-workspace

12.1 055 plasma-workspace Date: 2024-05-31 Severity: High

In plasma-workspace-6.0.5.1 (and 5.27.11.1), a security vulnerability was fixed that could allow unauthorized connections due to incorrectly allowing connections via ICE on the same host as Plasma is running on. This allows another user on the same machine to gain access to the session manager, and can be exploited to execute arbitrary code execution in the context of the current user on the next logon to the machine. Update to plasma-workspace-6.0.5.1 (or 5.27.11.1). 12.1-055

PostgreSQL

12.1 088 PostgreSQL Date: 2024-08-09 Severity: High

In PostgreSQL-16.4, a security vulnerability was fixed that could allow for relation replacement during pg_dump, which will execute arbitrary SQL commands. Update to PostgreSQL-16.4 (or 15.8, 14.13, 13.16, or 12.20). 12.1-088

12.1 048 PostgreSQL Date: 2024-05-29 Severity: Medium

In PostgreSQL-16.3 (as well as 15.7 and 14.12), a security vulnerability was fixed that could allow for an unprivileged database user to read most common values and other statistics from CREATE STATISTICS commands executed by other users. The most common values will reveal column values that the eavesdropped could not otherwise read, or results of functions that they cannot execute. Additional modifications are needed to existing databases. Please see the advisory for more details. Update to PostgreSQL-16.3 (or 15.7 or 14.12) and run the commands at the end of the advisory. 12.1-048

Python3

12.1 069 Python3 (LFS and BLFS) Date: 2024-07-10 Severity: Medium

In Python-3.12.4, a security vulnerability was fixed that could allow for incorrect information to be returned about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This occured due to inaccurate information from the IANA Special-Purpose Address Registries. Update to Python-3.12.4, or backport the patch if you are using an older version of Python. 12.1-069

Qt6

12.1 046 Qt6 Date: 2024-05-24 Severity: High

In Qt6-6.7.1, two security vulnerabilities were resolved that could allow for stack modification as well as for predictable encryption to occur when using Network Authentication in Qt. Update to Qt-6.7.1. 12.1-046.

QtWebEngine

12.1 070 QtWebEngine Date: 2024-07-10 Severity: High

In QtWebEngine-6.7.2, seven security vulnerabilities were fixed that could allow for remote code execution. All of these issues occur in the bundled version of Chromium, and happen in the WebRTC, Dawn, Media Session, Streams API, and V8 components within Chromium. Several of these issues are known to be actively exploited, so it is recommended that you update as soon as possible. Update to QtWebEngine-6.7.2. 12.1-070

12.1 047 QtWebEngine Date: 2024-05-24 Severity: Critical

In QtWebEngine-6.7.1, seventeen security vulnerabilities were fixed that could allow for remote code execution through crafted HTML pages, for a remotely exploitable sandbox escape, for arbitrary reading/writing of files via malicious HTML pages, for remotely exploitable crashes, content security policy bypasses, and for sensitive information disclosure. Several of these vulnerabilities have been exploited in the wild recently and it is recommended that you update to this version of QtWebEngine immediately. If you are still using a Qt5-based version of QtWebEngine, the BLFS team recommends that you migrate to Qt6, the Qt6 version of QtWebEngine, and the latest version of Falkon as soon as possible. Update to QtWebEngine-6.7.1. 12.1-047

12.1 024 QtWebEngine-5.15-20240403 Date: 2024-04-09 Severity: Critical

In the QtWebEngine-5.15-20240403 snapshot 16 vulnerabilities, of which 2 were rated Critical by NVD, have been fixed. The development books have moved on to Qt6 and the build instructions have changed slightly. Either update to current Qt6, or follow the instructions at 12.1-024

12.1 026 QtWebEngine-6.6.3 Date: 2024-04-11 Severity: Critical

The QtWebengine-6 releases do not provide any summary of bug fixes. The 6.6.3 and 6.7.0 releases each contain a similar set of fixes to security bugs, some of which are rated as Critical. In future, update to the latest version once it is in BLFS. 12.1-026

Ruby

12.1 035 Ruby Date: 2024-04-24 Severity: High

In Ruby-3.3.1, three security vulnerabilities were fixed that could allow for arbitrary memory address reading and remote code execution. The arbitrary memory reading vulnerabilities occur in StringIO and also in the Regex search functionality. The RCE vulnerability occurs in RDoc. Update to Ruby-3.3.1. 12.1-035

Samba

12.1 018 Samba Date: 2024-04-07 Severity: High

In Samba-4.20.0 a security vulnerability was fixed that could allow for privilege escalation through altering certificates. Update to Samba-4.20.0. 12.1-018

Seamonkey

12.1 027 Seamonkey Date: 2024-04-15 Severity: High

In Seamonkey-2.53.18.2, several security vulnerabilities were fixed that could allow for remotely exploitable crashes, content spoofing, cookie injection, arbitrary code execution, timing attacks, and content security policy bypasses. These are the same vulnerabilities fixed in Firefox and Thunderbird 115.8.0 and 115.9.0. Update to Seamonkey-2.53.18.2. 12.1-027

12.1 005 Seamonkey Date: 2024-03-07 Severity: High

In Seamonkey-2.53.18.1, several security vulnerabilities were fixed that could allow for remote code execution, exploitable crashes, sandbox escapes, S/MIME signatures being accepted in circumstances where they are not valid, undefined behavior, spoofed messages to be accepted when processing PGP/MIME payloads, HSTS policy bypasses, privilege escalation, phishing, permissions request bypassing, and a crash when listing printers on a system. These vulnerabilities are all identical to those fixed in Firefox/Thunderbird 115.6 and 115.7.0esr. Update to Seamonkey-2.53.18.1. 12.1-005

SpiderMonkey

12.1 085 SpiderMonkey Date: 2024-08-07 Severity: High

In SpiderMonkey-115.14.0, a security vulnerability was fixed that could allow for a remotely exploitable crash caused by a use-after-free when unexpected marking work at the start of sweeping during garbage collection occurs. Update to SpiderMonkey-115.14.0. 12.1-085

12.1 064 SpiderMonkey Date: 2024-06-12 Severity: High

In SpiderMonkey-115.12.0, a security vulnerability was fixed that could allow for a potentially exploitable crash if garbage collection was triggered at the right time. The vulnerability occurs due to a use-after-free during object transplant. Update to SpiderMonkey-115.12.0. 12.1-064

12.1 051 SpiderMonkey Date: 2024-05-31 Severity: High

In SpiderMonkey-115.11.0, a security vulnerability was fixed that could allow for arbitrary code execution when calling the IsDiamondPattern function. Update to SpiderMonkey-115.11.0. 12.1-051

12.1 031 SpiderMonkey Date: 2024-04-17 Severity: High

In SpiderMonkey/mozjs-115.10.0, three security vulnerabilities were fixed in the JIT compiler which could allow for GetBoundName to return the wrong object, for crashes after a mis-optimized switch statement, and for incorrect JITting of arguments to lead for crashes during garbage collection. This could allow for unexpected crashes in some applications. Update to SpiderMonkey/mozjs-115.10.0. 12.1-031

Thunderbird

12.1 087 Thunderbird Date: 2024-08-07 Severity: High

In Thunderbird-128.1.0esr, ten security vulnerabilities were fixed that could allow for fullscreen notification dialogs to be obscured, remote code execution, information disclosure, sandbox escapes, remotely exploitable crashes, cross-site scrripting, permission bypasses, and for security prompt obscuring. Update to Thunderbird-128.1.0esr. 12.1-087

12.1 076 Thunderbird Date: 2024-07-16 Severity: High

In Thunderbird-128.0esr (and 115.13.0esr), several security vulnerabilities were fixed that could alow for remote code execution, user confusion allowing for unauthorized permissions to be granted, moving the cursor outside of the Thunderbird window, crashes, blocking exit from fullscreen mode, Content Security Policy bypasses, and for cookies to be sent inadvertedly. Nore that most of these vulnerabilities only affect HTML mail. Update to Thunderbird-128.0esr (or 115.13.0esr). 12.1-076

12.1 053 Thunderbird Date: 2024-05-31 Severity: High

In Thunderbird-115.11.0, six security vulnerabilities were fixed that could allow for arbitrary code execution, arbitrary JavaScript execution, potential permissions bypasses, cross-origin reponse leakage, and crashes when saving pages to PDFs. Update to Thunderbird-115.11.0. 12.1-053

12.1 033 Thunderbird Date: 2024-04-17 Severity: High

In Thunderbird-115.10.0, eight security vulnerabilities were fixed that could allow for arbitrary code execution, remotely exploitable denial of service conditions (using HTTP/2 CONTINUATION frames), remotely exploitable crashes, and clickjacking. Some of these vulnerabilities occur when using the JIT compiler, but one of the vulnerabilities is 32-bit specific and allows for an Integer Overflow when processing a crafted OpenType font. Updating Thunderbird is recommended due to the HTTP/2 CONTINUATION attack, since some HTML mails may use this protocol. Update to Thunderbird-115.10.0. 12.1-032

12.1 011 Thunderbird Date: 2024-03-20 Severity: High

In Thunderbird-115.9.0, nine security vulnerabilities were fixed that could allow for remote code execution, remotely exploitable crashes, clickjacking (allowing a user to accidentally grant permissions), RSA decryption timing attacks, content security bypasses, and arbitrary code execution. Update to Thunderbird-115.9.0. 12.1-011

12.1 004 Thunderbird Date: 2024-03-06 Severity: High

In Thunderbird-115.8.1, a security vulnerability was fixed that could allow for leaking an encrypted email subject to another conversation. When this issue occurs, a user might accidentally leak the confidential subject to a third party. Additional steps are required if this subject mixing problem has occurred. Update to Thunderbird-115.8.1 or later and follow the instructions in the security advisory. 12.1-004

Unbound

12.1 092 Unbound Date: 2024-08-18 Severity: Low

In Unbound-1.21.0, three security vulnerabilities were fixed that could allow for DNS Cache Poisoning attacks and remotely exploitable crashes. The DNS Cache Poisoning attack is known as CacheFlush, while the CAMP attack allows for remotely exploitable crashes on most DNS server implementations. Update to Unbound-1.21.0. 12.1-092

12.1 007 Unbound Date: 2024-03-15 Severity: High

In Unbound-1.19.3, a security vulnerability was fixed that could allow an attack to cause a denial of service attack (DoS) exploting a code path that can lead to an infinite loop due to faulty code in the feature that removes EDE records. Update to Unbound-1.19.3. 12.1-007

urllib3 (Python Module)

12.1 090 urllib3 (Python Module) Date: 2024-08-12 Severity: Medium

In urllib3-2.2.2, two security vulnerabilities were fixed that could allow for unintentional information disclosure via the 'Cookie' HTTP header, and for the contents of HTTP request bodies to be unintentionally leaked after redirects. Update to urllib3-2.2.2. 12.1-090

VLC

12.1 058 VLC Date: 2024-06-07 Severity: High

In VLC-3.0.21, a security vulnerability was fixed in it's implementation of the MMS protocol that allows for an integer overflow to occur. When playing a crafted stream, this can allow for a denial-of-service or other impacts such as arbitrary code execution. Update to VLC-3.0.21. 12.1-058

vorbis-tools

12.1 079 vorbis-tools Date: 2024-07-22 Severity: High

In vorbis-tools-1.4.2, a security vulnerability was discovered that can allow for arbitrary code execution or a denial of service when processing a crafted WAV file and converting it to an OGG using the 'oggenc' command. Rebuild vorbis-tools-1.4.2 with the sed command in the book. 12.1-79

VTE

12.1 060 VTE Date: 2024-06-12 Severity: Medium

In VTE-0.76.3, a security vulnerability was fixed that allows an attacker to cause a denial of service (memory consumption) issue via a window resize escape sequence. This issue is similar to CVE-2000-0476. Update to VTE-0.76.3. 12.1-060

WebKitGTK

12.1 095 WebKitGTK Date: 2024-09-04 Severity: Critical

In WebKitGTK-2.44.3, six security vulnerabilities were fixed that could allow for unexpected process crashes that are remotely exploitable. These issues are mostly due to out-of-bounds reads and use-after-free issues. One issue though allows a remote attacker to potentially exploit heap corruption via a crafted HTML page due to a use-after-free in ANGLE. Update to WebKitGTK-2.44.3. 12.1-095

12.1 050 WebKitGTK Date: 2024-05-29 Severity: High

In WebKitGTK-2.42.2, a security vulnerability was fixed that could allow for an attacker with arbitrary read and write capabilities to bypass Pointer Authentication. The vulnerability was addressed with improved checks, and is known to be exploited in the wild. Update to WebKitGTK-2.42.2. 12.1-050

Wireshark

12.1 077 Wireshark Date: 2024-07-16 Severity: Low

In Wireshark-4.2.6, a security vulnerability was fixed that could allow for the application to crash when processing a malformed SPRT packet. This can happen while capturing packets on the wire, or when viewing a pcap file. Update to Wireshark-4.2.6. 12.1-077

12.1 041 Wireshark Date: 2024-05-22 Severity: Medium

In Wireshark-4.2.5, three security vulnerabilities were fixed that could allow for infinite loops when processing MONGO and ZigBee TLV packets, as well as for crashes when editing crafted packets using the 'editcap' utility. Update to Wireshark-4.2.5. 12.1-041

12.1 016 Wireshark Date: 2024-03-30 Severity: Medium

In Wireshark 4.2.0 to 4.2.3 and 4.0.0 to 4.0.13 a T.38 dissector crash allows denial of service via packet injection or a crafted capture file. Update to Wireshark-4.2.3. 12.1-016

Xorg-Server

12.1 020 Xorg-Server Updated: 2024-04-12 Severity: High

In Xorg-Server-21.1.12, four security vulnerabilities were fixed that could allow for memory leakage, exploitable crashes (segmentation faults), and arbitrary code execution to occur. On systems where SSH X Forwarding is enabled, this can lead to remote code execution. Update to xorg-server-21.1.13. If you have TigerVNC installed, rebuild it against xorg-server-21.1.13 as well. 12.1-020

Xwayland

12.1 021 Xwayland Updated: 2024-04-12 Severity: High

In Xwayland-23.2.5, three security vulnerabilities were fixed that could allow for memory leakage, exploitable crashes (segmentation faults), and arbitrary code execution to occur. Update to Xwayland-23.2.6. 12.1-021