BLFS Security Advisories for BLFS 11.0 and the current development books.
BLFS-11.0 was released on 2021-09-01
This page is in alphabetical order of packages, and if a package has multiple advisories the newer come first.
The links at the end of each item point to fuller details which have links to the released books.
In general, the severity is taken from upstream, if supplied, or from NVD (https://nvd.nist.gov/vuln/detail/) if an analysis is available there, but individual severity ratings at NVD can change over time. If no other information is available, 'High' will normally be assumed.
Apache HTTPD
11.0 042 Apache HTTPD Date: 2021-12-23 Severity: Critical
Two new security vulnerabilities were fixed in httpd-2.4.52 which could allow for a remotely exploitable crash, server-side-request forgery, or remote code execution (when using mod_lua). Updating to httpd-2.4.52 is recommended as soon as possible. 11.0-042
11.0 013 Apache HTTPD Date: 2021-10-12 Severity: Critical
Two new vulnerabilities were found in apache 2.4.49, and it was then discovered that the fix for a vulnerability rated as critical in some non-default configurations was incomplete. In such configurations, both may allow for remove code execution. The other new vulnerability in 2.4.49 allows for the server to be crashed. To fix these, update to httpd-2.4.51 or later. 11.0-013
11.0 006 Apache HTTPD Updated: 2021-12-13 Severity: Critical
Several vulnerabilities have been fixed in Apache HTTPD 2.4.49, one of which is rated high and another as critical. To fix these, update to httpd-2.4.51 or later. 11.0-006
AudioFile
11.0 034 AudioFile Date: 2021-12-13 Severity: Critical
On December 13th, 2021, the BLFS project discovered 13 security issues in AudioFile, and generated a patch. Note that AudioFile is only used in BLFS by KWave. If you have KWave or AudioFile installed, applying this patch should be done immediately. These include arbitrary command execution, arbitrary code execution, and denial of service vulnerabilities. 11.0-034
BIND
11.0 024 BIND Date: 2021-10-27 Severity: Medium
In BIND-9.16.22, a security vulnerability was fixed that could allow for a remote denial of service attack on servers that use the 'lame cache', which is enabled by default. NOTE: This only impacts the server, not the client side utilities. Update to BIND-9.16.22 if you have the server installed and configured. 11.0-024
cryptsetup
11.0 053 cryptsetup Date: 2022-01-13 Severity: High
In cryptsetup-2.3.6, a security vulnerability exists that could allow for a local attacker to decrypt a LUKS2 device without a user passphrase. This is done via manipulation of filesystem metadata while the disk is unmounted. Update to cryptsetup-2.4.3 immediately if you use an encrypted device. 11.0-053
cURL
11.0 008 cURL Date: 2021-09-22 Severity: High
In cURL-7.79.0, three security vulnerabilities were fixed that could allow for denial of service, malicious data injection, and encryption protocol downgrades. Updating to cURL-7.79.0 if you use FTP, SMTP, POP3, or IMAP is suggested as soon as possible. 11.0-008
Epiphany
11.0 055 Epiphany Date: 2022-01-13 Severity: Moderate
In Epiphany-41.3, four cross-site scripting vulnerabilities were fixed. These vulnerabilities existed in several areas, but most notably the internal error pages and the about:overview screen. Update to Epiphany-41.3. 11.0-055
Exempi
11.0 078 Exempi Date: 2022-02-14 Severity: Critical
In Exempi-2.6.1, several security vulnerabilities were fixed that could allow for remote code execution, arbitrary code execution, denial of service, and information disclosure. Most of these are due to memory safety issues. Update to Exempi-2.6.1 as soon as possible. 11.0-078
Exiv2
11.0 021 Exiv2 Date: 2021-10-27 Severity: Medium
In exiv2-0.27.5, six security vulnerabilities were fixed that could lead to a denial of service. Four of them exist in the exiv2 library and two in the exiv2 tool. Update to exiv2-0.27.5. 11.0-021
Fetchmail
11.0 011 Fetchmail Date: 2021-09-23 Severity: Medium
In fetchmail before version 6.4.22, on IMAP connections without --ssl and with nonempty --sslproto, meaning that fetchmail is to enforce TLS, if the server or an attacker sends a PREAUTH greeting, fetchmail used to continue an unencrypted connection. It is recommended to use '--ssl' or the ssl user option in an rcfile. Those were added to BLFS-11.0 in a note just before the release, the BLFS editors believe that using those removes the problem and in that case no update is necessary. In other cases, update to fetchmail-6.4.22 or later. 11.0-011
ffmpeg
11.0 022 ffmpeg Date: 2021-10-27 Severity: Critical
In ffmpeg-4.4.1 (and 4.3.3/4.2.5), eleven security vulnerabilities were fixed that could lead to remote denial of service, remote extraction of sensitive data, and remote code execution. Updating to ffmpeg-4.4.1 (or 4.3.3/4.2.5) as soon as possible. 11.0-022
Firefox
11.0 066 Firefox Date: 2022-02-09 Severity: High
In firefox 91.6.0 several CVE issues, two rated High, were fixed. To fix these update to firefox-91.6.0 or later. 11.0-066
11.0 050 Firefox Date: 2022-01-11 Severity: High
In firefox 91.5.0 several CVE issues, some rated High, were fixed. To fix these update to firefox-91.5.0 or later. 11.0-050
11.0 030 Firefox Date: 2021-12-07 Severity: High
In firefox 91.4.0 several CVE issues, some rated High, were fixed as well as memory safety bugs rated as High without a CVE (MOZ-2021-0009). To fix these update to firefox-91.4.0 or later. 11.0-030
11.0 025 Firefox Date: 2021-11-02 Severity: High
In firefox 78.15.0 and 91.2.0, the usual 'Memory Safety bugs' with a High severity have been fixed as well as some other items. For two of these, the CVE assignment is pending. To fix these update to firefox-91.3.0 or later. 11.0-025
11.0 012 Firefox Updated: 2021-11-02 Severity: Critical
In firefox 78.15.0 and 91.2.0, the usual 'Memory Safety bugs' with a High severity have been fixed as well as some other CVEs to which mozilla give a lower severity, but for one of these NVD has now rated it as critical. To fix these update to firefox-91.2.0 or later (Firefox-78 is now End of Life). 11.0-012
11.0 002 Firefox Updated: 2021-11-02 Severity: High
In firefox 78.14.0 and 91.1.0, the usual 'Memory Safety bugs' were fixed. To fix these update to firefox-91.1.0 or later (Firefox-78 is now End of Life). 11.0-002
gfbgraph
11.0 052 gfbgraph Date: 2022-01-11 Severity: High
In gfbgraph-0.2.5, a security vulnerability was fixed that causes remote code execution and injection/modifications of graphs because of a failure to perform TLS certificate validation. Update to gfbgraph-0.2.5 or later. 11.0-052
Ghostscript
11.0 005 Ghostscript Date: 2021-09-10 Severity: Critical
A vulnerability in the ghostscript library libgs.so which allows arbitrary code execution, for example by invoking the convert program from ImageMagick on a user-supplied image file, was announced in August with a public PoC provided. This was initially reported as applying to version 9.50. It has now been reported upstream and determined to apply to all current versions from 9.50 onwards. To fix this apply the upstream_fix-2 patch from the development books, or upgrade to a later release when that is available. 11.0-005
GnuTLS
11.0 058 GnuTLS Date: 2022-01-18 Severity: Low
A security advisory has been published by the GnuTLS team: When a single trust list object is shared among multiple threads, calls to gnutls_x509_trust_list_verify_crt2() was able to corrupt temporary memory where internal copy of an issuer certificate is stored. The code path is only taken when a PKCS#11 based trust store is enabled and the issuer certificate is already stored as trusted. To fix this upgrade to GnuTLS 3.7.3 or later. 11.0-058
Grilo
11.0 048 Grilo Date: 2022-01-10 Severity: Moderate
In Grilo-0.3.14, a security vulnerability was fixed that could allow for silent TLS encryption downgrades and man-in-the-middle attacks. This could result in a high confidentiality impact. Update to Grilo-0.3.14 as soon as possible. 11.0-048
gst-plugins-base
11.0 074 gst-plugins-base Date: 2022-02-13 Severity: Medium
In gst-plugins-base-1.20.0 (and 1.18.6), a security vulnerability was fixed that can cause a denial of service when processing tags in files due to a race condition. Update to gst-plugins-base-1.20.0 (or 1.18.6). 11.0-074.
ImageMagick
11.0 080 ImageMagick Date: 2022-02-18 Severity: High
Two vulnrabilities have been found in ImageMagick, a Heap-based buffer overflow in the TIFF coder, and a stack overflow when parsing a malicious ps image file. To fix these update to ImageMagick-7.1.0-25 or later. 11.0-080.
Intel Microcode
11.0 067 Intel Microcode Date: 2022-02-12 Severity: Medium
Intel microcode for Skylake and later processors has been updated to fix two vulnerabilities, a privilege escalation on certain recent Pentium, Celeron and Atom processors, and for all Skylake and later processors a local Denial of Service. To fix these, update affected machines to microcode-20220207 or later. 11.0-067
libarchive
11.0 071 libarchive Date: 2022-02-13 Severity: Medium
In libarchive-3.6.0, two security vulnerabilities were fixed that could allow for a symbolic link attack and for a denial of service. Update to libarchive-3.6.0 or later. 11.0-071
libexif
11.0 009 libexif Date: 2021-09-22 Severity: Moderate
In libexif-0.6.23, two security vulnerabilities that could lead to denial of service were fixed in addition to the ones that were patched separately in BLFS 10.1. Update to libexif-0.6.23 or later. 11.0-009
libgcrypt
11.0 070 libgcrypt Date: 2022-02-13 Severity: Medium
In libgcrypt-1.10.0, a security vulnerability that could lead to plaintext encryption key recovery was fixed. Update to libgcrypt-1.10.0 or later. 11.0-070
libgrss
11.0 051 libgrss Date: 2022-01-11 Severity: High
In libgrss-0.7.0, a security vulnerability was discovered that allows for remote code execution and silent manipulation of RSS feeds. The BLFS developers have modified the existing bugfixes patch. Rebuild with the new bugfixes patch to fix this vulnerability. 11.0-051
libxml2
11.0 085 libxml2 Date: 2022-02-24 Severity: High
In libxml2-2.9.13, a security vulnerability was fixed that could allow for remote attackers to cause remote code execution in any XML document that has ID or IDREF attributes contained within it. Update to libxml2-2.9.13 or later as soon as possible. 11.0-085
libxslt
11.0 083 libxslt Date: 2022-02-24 Severity: High
In libxslt-1.1.35, a security vulnerability was fixed that could allow for remote attackers to cause remote code execution in any XML document that would trigger the xsltApplyTemplates function. Update to libxslt-1.1.35 or later as soon as possible. 11.0-083
lxml
11.0 036 lxml Date: 2021-12-18 Severity: High
In lxml-4.7.1, two security vulnerabilities were resolved that could allow for crafted script content to pass through the HTML Cleaner using SVG files or CSS. Update to lxml-4.7.1 or later. 11.0-036
Lynx
11.0 039 Lynx Date: 2021-12-18 Severity: Medium
In Lynx-2.8.9rel.1, a security vulnerability exists that could allow for passwords to be leaked in cleartext when using HTTPS connections. The BLFS Editors have created a patch that should be applied if you use Lynx. 11.0-039
make-ca
11.0 047 make-ca Date: 2021-01-10 Severity: Moderate
In make-ca-1.9, a security vulnerability exists that could allow a MIM attack for a remote attacker holding fraudulent certificates from some hacked CAs explicitly untrusted by Mozilla. Update to make-ca-1.10 or later. 11.0-047
MariaDB
11.0 079 MariaDB Date: 2022-02-14 Severity: High
In MariaDB-10.6.7, several security vulnerabilties were fixed that could lead to application crashes and information disclosure. Most of these vulnerabilities have to do with API calls, but some also occur with certain SELECT statements. Update to MariaDB-10.6.7. 11.0-079
MIT Kerberos V5
11.0 016 MIT Kerberos V5 Date: 2021-10-18 Severity: Medium
In MIT Kerberos V5-1.18.2, a security vulnerability exists that could allow for a remote attacker to crash the KRB5 Key Distribution Center service. If you are using MIT Kerberos V5 for authentication, apply the sed in the development books or update to a newer version when available. 11.0-016
Node.js
11.0 049 Node.js Date: 2022-01-11 Severity: Medium
In node.js-16.13.2, four medium-severity vulnerabilities were fixed. Update to node.js-16.13.2 or later. 11.0-049
11.0 014 Node.js Date: 2021-10-13 Severity: Medium
In node.js-14.18.1, two HTTP Request Smuggling vulnerabilities were fixed. Update to node.js-14.18.1 or later. 11.0-014
11.0 001 Node.js Date: 2021-09-07 Severity: High
In node.js-14.17.6, five security vulnerabilities have been fixed that could allow for arbitrary file creation/overwrite and arbitrary code execution. Update to node.js-14.17.6 or later. 11.0-001
NSS
11.0 029 NSS Date: 2021-12-02 Severity: Critical
Versions of NSS before 3.73 or 3.68.1-ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Update to nss-3.73 or later. 11.0-029
OpenJDK
11.0 035 OpenJDK Date: 2021-12-17 Severity: Critical
In OpenJDK-17.0.1, several security vulnerabilities were fixed that could allow for remote code execution, remote denial of service, and information modification. In addition, this version also assists with protecting your system from Log4Shell. Update to OpenJDK-17.0.1 immediately to protect yourself from exploitation. 11.0-035
PHP
11.0 084 PHP Date: 2022-02-24 Severity: Moderate
In PHP-8.1.3, a security vulnerability was fixed that could allow for a denial of service when using the php_filter_float() function. Update to php-8.1.3 if you are using the php_filter_float() function. 11.0-084
11.0 041 PHP Date: 2021-12-23 Severity: High
In PHP-8.1.1, a security vulnerability was fixed that could allow for an out-of-bounds read when using the preg_replace function. This only affects users who are using preg_replace in their PHP applications. If you are using preg_replace, update to PHP-8.1.1 as soon as possible. 11.0-041
11.0 031 PHP Date: 2021-12-13 Severity: Medium
In php-8.0.13, a security vulnerability was fixed that could allow for a remote attacker to read a different file than what a programmer originally intended. If you use XML functions inside of PHP, you should update to php-8.0.13 as soon as possible. 11.0-031
11.0 020 PHP Date: 2021-10-27 Severity: Critical
In php-8.0.12, a security vulnerability in php-fpm was fixed that allows for remote attackers to elevate privileges to root and execude code on a server running PHP-FPM and Apache HTTPD. If you have PHP-FPM installed/started, update to php-8.0.12 immediately. 11.0-020
polkit
11.0 059 polkit Date: 2022-01-26 Severity: High
In polkit-0.120, a security vulnerability allowing allowing local privilege escalation has been identified. This affects polkit since 0.94. Apply the patch to fix the vulnerability and rebuild polkit immediately. 11.0-059
PostgreSQL
11.0 033 PostgreSQL Date: 2021-12-13 Severity: High
In PostgreSQL-14.1 (and other versions), two security vulnerabilities were fixed that could allow for remote attackers to inject SQL queries into an encrypted connection and allow for the PostgreSQL Client to process unencrypted bytes using a man-in-the-middle attack. If you use the PostgreSQL server over the network, update to PostgreSQL-14.1 or later. 11.0-033
Python 3
11.0 007 Python (LFS and BLFS) Date: 2021-09-22 Severity: Moderate
In Python3 before 3.9.7, three security vulnerabilities were fixed that could cause SMTP command injection, crashes, and performance degredation. Update to Python-3.9.7 or later. 11.0-007
Qt5
11.0 061 Qt5 Date: 2022-01-28 Severity: Medium
An Out Of Bounds Write was discovered in the SVG component of Qt. This has been fixed upstream in the paid-for commercial releases, but for the free versions it is necessary to patch it. 11.0-061
QtWebEngine
11.0 057 QtWebEngine Date: 2022-01-17 Severity: High
Thirty-one more CVEs (from Chromium) in QtWebEngine, of which at least seventeen are rated as High, have been fixed in the 5.15.8 version. Update to 5.15.8 or use a later version. 11.0-057
11.0 028 QtWebEngine Date: 2021-11-27 Severity: Critical
Twenty more CVEs (from Chromium) in QtWebEngine, most rated as High but two rated as Critical, have been fixed in the 5.15.7 version. Patch the BLFS qtwebengine-5.15.6 tarball up to 5.15.7 or use a later version. 11.0-028
Ruby
11.0 032 Ruby Date: 2021-12-13 Severity: Critical
In Ruby-3.0.3, three security vulnerabilities were patched that could allow for denial of service, content/cookie spoofing, and arbitrary code execution via a buffer overflow. Update to ruby-3.0.3 or later. 11.0-032
Rustc
11.0 059 Rustc Date: 2022-01-25 Severity: High
In all versions of rust before 1.58.1 an attacker can exploit a race condition to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Update to rust-1.58.1 or later, and if necessary rebuild any privileged rust programs. 11.0-060
Samba
11.0 076 Samba Date: 2022-02-13 Severity: Critical
In Samba-4.15.5, three security vulnerabilities were fixed, including one which allows for trivial remote code execution as root on Samba servers with the vfs_fruit module installed. Another vulnerability allows for impersonation of Active Directory users and computers. Update to Samba-4.15.5 immediately. 11.0-076
11.0 026 Samba Date: 2021-11-11 Severity: Critical
In Samba-4.15.2 (and 4.14.10), eight vulnerabilities have been identified. To fix them, update to samba-4.15.2 (or 4.14.10). The details can be found in the links given in 11.0-026.
11.0 023 Samba Date: 2021-10-27 Severity: High
In Samba-4.15.1 (and 4.14.9), a security vulnerability was fixed that could allow for a remote attacker to bypass authentication using Samba's internal Kerberos implementation. Update to Samba-4.15.1 (or 4.14.9) if you are using the Samba server. 11.0-023
11.0 017 Samba Date: 2021-10-20 Severity: Medium
In Samba-4.15.0, a security vulnerability was fixed that could allow for a remote attacker to crash the Samba server process. Note that this only affects LFS users if they are running an Active Directory Domain Controller through Samba. If you are running one, upgrade to Samba-4.15.0 or later. 11.0-017
Seamonkey
11.0 043 Seamonkey Date: 2021-12-23 Severity: Critical
In Seamonkey-2.53.10.1, several security vulnerabilities were fixed that could lead to remote code execution, content spoofing, remotely exploitable crashes, and more. Seamonkey-2.53.10.1 as soon as possible. 11.0-043
11.0 018 Seamonkey Date: 2021-10-21 Severity: High
In Seamonkey-2.53.9.1, the memory safety bug that was fixed in Firefox 78.14.0 was fixed, which prevents remote code execution. Update to Seamonkey-2.53.9.1 or later. 11.0-018
SANE
11.0 003 SANE Date: 2021-09-08 Severity: Medium
In sane-backends-1.0.32, several security vulnerabilities with Epson scanners were resolved that could lead to malicious scanners reading important information from programs that use SANE, executing arbitrary code, or crashing programs that use SANE. Update to sane-backends-1.0.32 if you have an Epson scanner on your network. 11.0-003
systemd
11.0 054 systemd Date: 2022-01-13 Severity: High
In systemd-249 (and systemd-250), a security vulnerability was discovered that allows for symlink attacks and infinite recursion (leading to a crash of systemd-tmpfiles). The BLFS Editors have developed patches for 249 and 250. See the advisory for instructions on updating your system. 11.0-054
Thunderbird
11.0 088 Thunderbird Date: 2022-02-24 Severity: High
In Thunderbird-91.6.1, a security vulnerability was fixed that could allow for trivial remote code execution when Thunderbird processes a crated email message. Update to Thunderbird-91.6.1. 11.0-088
11.0 077 Thunderbird Date: 2022-02-14 Severity: High
In Thunderbird-91.6.0, several security vulnerabilities were fixed that could allow for remotely exploitable crashes, arbitrary code execution, content security policy bypasses, and more. Update to Thunderbird-91.6.0. 11.0-077
11.0 056 Thunderbird Date: 2022-01-13 Severity: High
In Thunderbird-91.5.0, several security vulnerabilities were fixed that could allow for remotely exploitable crashes, remote code execution, and content spoofing. Update to Thunderbird-91.5.0. 11.0-056
11.0 040 Thunderbird Date: 2021-12-23 Severity: Critical
In Thunderbird-91.4.1, several security vulnerabilities were fixed. There are a variety of impacts, from remote code execution to unencrypting emails and querying installed applications on a system remotely. At least three vulnerabilities have been rated critical. Update to Thunderbird-91.4.1 as soon as possible. 11.0-040
11.0 019 Thunderbird Date: 2021-09-21 Severity: Critical
In Thunderbird-91.2.0, several security vulnerabilities were fixed. One that is notable allows for silent downgrades of STARTTLS connections to mail servers. Updating is recommended as soon as possible. Update to Thunderbird-91.2.0. 11.0-019
11.0 004 Thunderbird Date: 2021-09-10 Severity: High
In thunderbird 91.1.0, a few Memory Safety bugs were fixed. To fix this, update to thunderbird-91.1.0. 11.0-004
VIM
11.0 081 VIM (LFS and BLFS) Date: 2022-02-22 Severity: High
Another heap-based buffer overflow, causing a crash when repeatedly using :retab, was fixed in vim-8.2.4359. To fix this update to vim-8.2.4383 or later. 11.0-081
11.0 063 VIM (LFS and BLFS) Date: 2022-02-01 Severity: High
Many security vulnerabilities in vim have been fixed in versions up to vim-8.2.4236. Fifteen of these have been rated as High by the NVD. Unfortunately, the details are minimal. 11.0-063
11.0 015 VIM (LFS and BLFS) Date: 2021-10-18 Severity: High
In VIM-8.2.3508, three security vulnerabilities were fixed that could lead to crashes and arbitrary code execution. Updating to vim-8.2.3508 is suggested if you're using UTF-8 encoded files or XML files. 11.0-015
WebKitGTK+
11.0 087 WebKitGTK+ Date: 2022-02-24 Severity: Critical
In WebKitGTK+-2.34.6, a critical zero-day security vulnerability was fixed that could allow for remote code execution. This vulnerability is known to be exploited in the wild. Update to WebKitGTK+-2.34.6 immediately. 11.0-087
11.0 075 WebKitGTK+ Date: 2022-02-13 Severity: Critical
In WebKitGTK+-2.34.5, several security vulnerabilities were fixed that could allow for denial of service, remote code execution, security policy bypasses, and for information disclosure. Public proof-of-concept exploits exist for the information disclosure vulnerability. Update to WebKitGTK+-2.34.5 immediately. 11.0-075
11.0 044 WebKitGTK+ Date: 2021-12-23 Severity: Medium
In WebKitGTK+-2.34.3, two security vulnerabilities were fixed that could allow for universal cross-site scripting and for a content security policy to be bypassed (if one is enabled). Update to WebKitGTK+-2.34.3. 11.0-044
11.0 010 WebKitGTK+ Updated: 2021-10-26 Severity: Critical
In WebKitGTK+-2.34.0, a security vulnerability named "FORCEDENTRY" was patched. This security vulnerability allows for silent execution of arbitrary code through malicious advertisements or web pages, and is being actively exploited in the wild. Update to WebKitGTK+-2.34.1 immediately. 11.0-010
Wireshark
11.0 072 Wireshark Date: 2022-02-13 Severity: High
In Wireshark-3.6.2, several security vulnerabilities were fixed that could allow for denial-of-service conditions, including application crashes and resource exhaustion. These can also be exploited when viewing packet capture files. There is a long list of protocol dissectors affected. Update to Wireshark-3.6.2 as soon as possible. 11.0-072
11.0 046 Wireshark Date: 2022-01-03 Severity: High
In Wireshark-3.6.1, several security vulnerabilities were fixed in packet dissectors that could lead to denial-of-service conditions, including application crashes and resource exhaustion. These can also occur when dissecting *.pcapng and RFC 7468 files. Update to Wireshark-3.6.1 as soon as possible. 11.0-046
11.0 027 Wireshark Date: 2021-11-22 Severity: Medium
In Wireshark-3.4.10, several security vulnerabilities were fixed in packet dissectors that could lead to denial-of-service conditions, including application crashes and resource exhaustion. If you use Wireshark to dissect packets often, update to Wireshark-3.4.10 as soon as possible. 11.0-027
wpa_supplicant
11.0 045 wpa_supplicant Date: 2021-12-26 Severity: High
The BLFS Editors became aware of six security vulnerabilities in wpa_supplicant and has developed a patch to fix them. If you use wpa_supplicant, apply the patch as soon as possible. See the advisory for more details. 11.0-045
xorg-server
11.0 038 xorg-server Date: 2021-12-18 Severity: High
In xorg-server-21.1.2, four security vulnerabilities were fixed that could allow for remote code execution on systems with SSH forwarding enabled, or local privilege escalation on local systems. These vulnerabilities are due to input validation failures in several extensions. Update to xorg-server-21.1.2. 11.0-038
XWayland
11.0 037 XWayland Date: 2021-12-18 Severity: High
In XWayland-21.1.4, four security vulnerabilities were fixed that could allow for remote code execution on systems with SSH forwarding enabled, or local privilege escalation on local systems. These vulnerabilities are due to input validation failures in several extensions. Update to XWayland-21.1.4. 11.0-037
zsh
11.0 073 zsh Date: 2022-02-13 Severity: High
In zsh-5.8.1, a security vulnerability was fixed during PROMPT_SUBST expansion that could lead to arbitrary code execution. A proof-of-concept exploit exists. Update to zsh-5.8.1 immediately if you use zsh. 11.0-073