USN-5008-2: Avahi vulnerability
7 July 2021
Avahi could be made to denial of service if it received a specially crafted input.
Releases
Packages
- avahi - Avahi IPv4LL network address configuration daemon
Details
USN-5008-1 fixed a vulnerability in avahi. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
avahi-daemon
-
0.6.32~rc+dfsg-1ubuntu2.3+esm1
Available with Ubuntu Pro
-
libavahi-core7
-
0.6.32~rc+dfsg-1ubuntu2.3+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
avahi-daemon
-
0.6.31-4ubuntu1.3+esm1
Available with Ubuntu Pro
-
libavahi-core7
-
0.6.31-4ubuntu1.3+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5008-1: libavahi-glib1, avahi-ui-utils, avahi-utils, python3-avahi, gir1.2-avahi-0.6, avahi-dnsconfd, libavahi-ui-gtk3-0, libavahi-common-data, avahi-daemon, libavahi-client3, python-avahi, libavahi-common-dev, libavahi-compat-libdnssd-dev, avahi-discover, libavahi-core7-udeb, libavahi-client-dev, avahi-autoipd, libavahi-gobject0, libavahi-compat-libdnssd1, avahi, libavahi-common3, libavahi-core-dev, libavahi-glib-dev, libavahi-core7, libavahi-ui-gtk3-dev, libavahi-common3-udeb, libavahi-gobject-dev