UbuntuUpdates.org

Package "avahi"

Name: avahi

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Avahi IPv4LL network address configuration daemon
  • Avahi mDNS/DNS-SD daemon
  • Avahi browsing, publishing and discovery utilities
  • GObject introspection data for Avahi

Latest version: 0.7-3.1ubuntu1.3
Release: bionic (18.04)
Level: security
Repository: main

Links



Other versions of "avahi" in Bionic

Repository Area Version
base main 0.7-3.1ubuntu1
base universe 0.7-3.1ubuntu1
security universe 0.7-3.1ubuntu1.3
updates main 0.7-3.1ubuntu1.3
updates universe 0.7-3.1ubuntu1.3

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 0.7-3.1ubuntu1.3 2021-07-07 19:06:50 UTC

  avahi (0.7-3.1ubuntu1.3) bionic-security; urgency=medium

  * SECURITY UPDATE: DoS via infinite loop on local socket
    - debian/patches/CVE-2021-3468.patch: handle HUP event in
      avahi-daemon/simple-protocol.c.
    - CVE-2021-3468

 -- Marc Deslauriers <email address hidden> Tue, 06 Jul 2021 11:39:41 -0400

CVE-2021-3468 A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is no

Version: *DELETED* 2019-01-31 19:06:26 UTC
No changelog for deleted or moved packages.

Version: 0.7-3.1ubuntu1.2 2019-01-31 14:06:44 UTC

  avahi (0.7-3.1ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2017-6519-and-CVE-2018-1000845.patch:
      fix in avahi-core/server.c.
    - CVE-2017-6519
    - CVE-2018-1000845

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 30 Jan 2019 12:32:00 -0300

CVE-2017-6519 avahi-daemon in Avahi through 0.6.32 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote a
CVE-2018-1000845 Avahi version 0.7 contains a Incorrect Access Control vulnerability in avahi-daemon that can result in Traffic reflection and amplification for DDoS



About   -   Send Feedback to @ubuntu_updates