USN-5008-1: Avahi vulnerabilities

07 July 2021

Several security issues were fixed in Avahi.

Releases

Packages

  • avahi - IPv4LL network address configuration daemon

Details

Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2021-3468)

It was discovered that Avahi incorrectly handled certain hostnames. A local
attacker could possibly use this issue to cause Avahi to crash, resulting
in a denial of service. This issue only affected Ubuntu 20.10 and Ubuntu
21.04. (CVE-2021-3502)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04
Ubuntu 18.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-5008-2: avahi, avahi-discover, libavahi-compat-libdnssd-dev, avahi-daemon, libavahi-common3-udeb, libavahi-core-dev, libavahi-qt4-1, libavahi-core7-udeb, libavahi-client3, avahi-utils, libavahi-ui-gtk3-dev, libavahi-glib-dev, libavahi-compat-libdnssd1, libavahi-common-dev, avahi-autoipd, libavahi-gobject0, avahi-dnsconfd, libavahi-gobject-dev, libavahi-ui-gtk3-0, libavahi-common3, libavahi-glib1, python-avahi, libavahi-core7, libavahi-common-data, libavahi-qt4-dev, libavahi-client-dev, avahi-ui-utils, libavahi-ui0, libavahi-ui-dev