ELA-624-1 avahi security update

denial of service

2022-06-14
Packageavahi
Version0.6.31-5+deb8u1
Related CVEs CVE-2021-3468 CVE-2021-26720


It was discovered that the Debian package of Avahi, a framework for Multicast DNS Service Discovery, executed the script avahi-daemon-check-dns.sh with root privileges which would allow a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /var/run/avahi-daemon. This script is now executed with the privileges of user and group avahi and requires sudo in order to achieve that.

Furthermore it was found (CVE-2021-3468) that the event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop.



For Debian 8 jessie, these problems have been fixed in version 0.6.31-5+deb8u1.

We recommend that you upgrade your avahi packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.