Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:1845-1

Опубликовано: 11 июл. 2021
Источник: suse-cvrf

Описание

Security update for avahi

This update for avahi fixes the following issues:

  • CVE-2021-3468: avoid infinite loop by handling HUP event in client_work (bsc#1184521).
  • CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827)
  • Update avahi-daemon-check-dns.sh from Debian. Our previous version relied on ifconfig, route, and init.d.
  • Add sudo to requires: used to drop privileges.

Список пакетов

openSUSE Leap 15.3
python-avahi-0.6.32-5.13.1
python-avahi-gtk-0.6.32-5.13.1

Описание

avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.


Затронутые продукты
openSUSE Leap 15.3:python-avahi-0.6.32-5.13.1
openSUSE Leap 15.3:python-avahi-gtk-0.6.32-5.13.1

Ссылки

Описание

A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.


Затронутые продукты
openSUSE Leap 15.3:python-avahi-0.6.32-5.13.1
openSUSE Leap 15.3:python-avahi-gtk-0.6.32-5.13.1

Ссылки