USN-5008-2: Avahi vulnerability

07 July 2021

Avahi could be made to denial of service if it received a specially crafted input.

Releases

Packages

  • avahi - Avahi IPv4LL network address configuration daemon

Details

USN-5008-1 fixed a vulnerability in avahi. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-5008-1: libavahi-core7, libavahi-core-dev, gir1.2-avahi-0.6, libavahi-common3-udeb, libavahi-client3, libavahi-core7-udeb, libavahi-common3, avahi-autoipd, libavahi-common-data, libavahi-glib1, avahi-discover, libavahi-ui-gtk3-0, libavahi-compat-libdnssd-dev, python3-avahi, libavahi-ui-gtk3-dev, libavahi-gobject-dev, avahi, libavahi-common-dev, libavahi-gobject0, python-avahi, avahi-dnsconfd, libavahi-compat-libdnssd1, avahi-utils, avahi-ui-utils, avahi-daemon, libavahi-client-dev, libavahi-glib-dev