USN-5008-1: Avahi vulnerabilities

07 July 2021

Several security issues were fixed in Avahi.

Releases

Packages

  • avahi - IPv4LL network address configuration daemon

Details

Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2021-3468)

It was discovered that Avahi incorrectly handled certain hostnames. A local
attacker could possibly use this issue to cause Avahi to crash, resulting
in a denial of service. This issue only affected Ubuntu 20.10 and Ubuntu
21.04. (CVE-2021-3502)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04
Ubuntu 18.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-5008-2: libavahi-qt4-1, libavahi-common-data, avahi, libavahi-gobject-dev, libavahi-core7, libavahi-qt4-dev, libavahi-ui-gtk3-0, libavahi-client3, avahi-discover, libavahi-glib-dev, libavahi-compat-libdnssd-dev, libavahi-compat-libdnssd1, libavahi-ui-gtk3-dev, libavahi-gobject0, avahi-autoipd, libavahi-ui-dev, libavahi-ui0, avahi-daemon, avahi-ui-utils, avahi-dnsconfd, avahi-utils, libavahi-common-dev, python-avahi, libavahi-client-dev, libavahi-core-dev, libavahi-core7-udeb, libavahi-glib1, libavahi-common3, libavahi-common3-udeb