Your submission was sent successfully! Close

USN-5008-2: Avahi vulnerability

7 July 2021

Avahi could be made to denial of service if it received a specially crafted input.



  • avahi - Avahi IPv4LL network address configuration daemon


USN-5008-1 fixed a vulnerability in avahi. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

In general, a standard system update will make all the necessary changes.


Related notices

  • USN-5008-1: python3-avahi, avahi-utils, avahi-daemon, libavahi-client-dev, gir1.2-avahi-0.6, libavahi-core7-udeb, avahi, avahi-ui-utils, libavahi-gobject-dev, avahi-dnsconfd, python-avahi, libavahi-gobject0, libavahi-client3, libavahi-compat-libdnssd-dev, libavahi-compat-libdnssd1, libavahi-glib1, libavahi-common-data, libavahi-core-dev, libavahi-common3, avahi-autoipd, libavahi-ui-gtk3-0, libavahi-common-dev, libavahi-glib-dev, libavahi-core7, avahi-discover, libavahi-common3-udeb, libavahi-ui-gtk3-dev