USN-5008-2: Avahi vulnerability
7 July 2021
Avahi could be made to denial of service if it received a specially crafted input.
Releases
Packages
- avahi - Avahi IPv4LL network address configuration daemon
Details
USN-5008-1 fixed a vulnerability in avahi. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
avahi-daemon
-
0.6.32~rc+dfsg-1ubuntu2.3+esm1
Available with Ubuntu Pro
-
libavahi-core7
-
0.6.32~rc+dfsg-1ubuntu2.3+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
avahi-daemon
-
0.6.31-4ubuntu1.3+esm1
Available with Ubuntu Pro
-
libavahi-core7
-
0.6.31-4ubuntu1.3+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.