Your submission was sent successfully! Close

USN-5008-2: Avahi vulnerability

7 July 2021

Avahi could be made to denial of service if it received a specially crafted input.

Releases

Packages

  • avahi - Avahi IPv4LL network address configuration daemon

Details

USN-5008-1 fixed a vulnerability in avahi. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-5008-1: libavahi-client-dev, avahi-dnsconfd, python3-avahi, avahi-autoipd, libavahi-ui-gtk3-dev, avahi-utils, libavahi-glib-dev, libavahi-client3, avahi-daemon, gir1.2-avahi-0.6, libavahi-common-dev, libavahi-ui-gtk3-0, avahi-discover, libavahi-core7, libavahi-compat-libdnssd-dev, libavahi-gobject-dev, avahi-ui-utils, libavahi-glib1, libavahi-gobject0, avahi, libavahi-core-dev, libavahi-common-data, libavahi-core7-udeb, libavahi-common3, libavahi-compat-libdnssd1, python-avahi, libavahi-common3-udeb