USN-6129-1: Avahi vulnerability
1 June 2023
Avahi could be made to crash if it received specially crafted DBus traffic.
Releases
Packages
- avahi - IPv4LL network address configuration daemon
Details
It was discovered that Avahi incorrectly handled certain DBus messages. A
local attacker could possibly use this issue to cause Avahi to crash,
resulting in a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
Ubuntu 22.10
Ubuntu 22.04
Ubuntu 20.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6129-2: libavahi-compat-libdnssd1, avahi-utils, python-avahi, libavahi-gobject0, avahi-ui-utils, libavahi-ui-gtk3-0, gir1.2-avahi-0.6, libavahi-common3, avahi-daemon, libavahi-core-dev, avahi-autoipd, libavahi-gobject-dev, libavahi-client3, libavahi-common-dev, avahi, libavahi-ui-dev, libavahi-glib1, libavahi-qt4-1, libavahi-qt4-dev, libavahi-common-data, avahi-discover, libavahi-ui0, libavahi-ui-gtk3-dev, libavahi-client-dev, libavahi-core7, libavahi-glib-dev, libavahi-compat-libdnssd-dev, avahi-dnsconfd