USN-5008-1: Avahi vulnerabilities
7 July 2021
Several security issues were fixed in Avahi.
Releases
Packages
- avahi - IPv4LL network address configuration daemon
Details
Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2021-3468)
It was discovered that Avahi incorrectly handled certain hostnames. A local
attacker could possibly use this issue to cause Avahi to crash, resulting
in a denial of service. This issue only affected Ubuntu 20.10 and Ubuntu
21.04. (CVE-2021-3502)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04
Ubuntu 18.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5008-2: libavahi-core7, libavahi-qt4-dev, libavahi-common3-udeb, libavahi-ui0, libavahi-client3, libavahi-client-dev, libavahi-glib-dev, avahi-daemon, libavahi-compat-libdnssd1, avahi-autoipd, avahi, libavahi-gobject-dev, libavahi-ui-gtk3-dev, avahi-ui-utils, libavahi-ui-dev, libavahi-ui-gtk3-0, avahi-dnsconfd, libavahi-common3, libavahi-compat-libdnssd-dev, avahi-utils, libavahi-common-dev, avahi-discover, libavahi-common-data, libavahi-core-dev, libavahi-core7-udeb, libavahi-glib1, libavahi-gobject0, libavahi-qt4-1, python-avahi