LFS-10.0 was released on 2020-09-01
This page is in alphabetical order of packages, and if a package has multiple advisories the newer come first.
The links at the end of each item point to fuller details which have links to the released books.
Bison-3.7.2 fixed all known CVE vulnerabilities in bison itself, the generated code should not be affected. See 10.0-009
In LFS the only safe way to update Glibc is to build a new system.
In Glibc before 2.33 there are four vulnerabilities in iconv which can lead to a crash when processing less-common character encodings.
Please read the link to assess the severity of this for your use case, and what action to take. 10.0-082
In Linux kernels before 5.8.8 there is a potential privilege escalation in 64-bit kernels. 10.0-010
Two vulnerabilities in OpenSSL could be exploited to cause a crash. To fix this, update to OpenSSL-1.1.1j or later. 10.0-095
A vulnerability in OpenSSL could be exploited to cause a crash. To fix this, update to OpenSSL-1.1.1i or later. 10.0-053
Python-3.9.2 contains fixes for a critical security vulnerability as well as a medium-level security vulnerability. The critical vulnerability can lead to remote code execution. Update to Python-3.9.2 or later using the BLFS instructions. 10.0-097
Python-3.9.1 includes three security fixes. Update to Python-3.9.1 or later using the BLFS instructions. 10.0-051
In systemd-220 and later, a security vulnerability exists that will allow for a local attacker to crash your system by mounting a FUSE filesystem that with a file path longer than 8MB present. The crash occurs when reading /proc/self/mountinfo, and manifests itself as a kernel panic due to PID1 (init) crashing. Because fo the changes coming in LFS 11.0, updating to systemd-249 (with the patch) is not feasible. However, a patch has been created for LFS 10.0/systemd-246. See the advisory linked for more information. The patch replaces the current systemd-246-security_fix-1.patch. 10.1-081
systemd-249 fixed a security vulnerability that could allow for a remote attacker to reconfigure the network settings on your computer. Because of it's severity and the ease of exploitation, a patch has been prepared for LFS 10.0/systemd-246. See the advisory linked for more information. 10.1-072