Описание
Security update for avahi
This update for avahi fixes the following issues:
- CVE-2021-3468: avoid infinite loop by handling HUP event in client_work (bsc#1184521).
- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827)
- Update avahi-daemon-check-dns.sh from Debian. Our previous version relied on ifconfig, route, and init.d.
- Add sudo to requires: used to drop privileges.
Список пакетов
openSUSE Leap 15.3
Ссылки
- E-Mail link for openSUSE-SU-2021:1845-1
- SUSE Security Ratings
- SUSE Bug 1180827
- SUSE Bug 1184521
- SUSE CVE CVE-2021-26720 page
- SUSE CVE CVE-2021-3468 page
Описание
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.
Затронутые продукты
Ссылки
- CVE-2021-26720
- SUSE Bug 1180827
- SUSE Bug 1180865
- SUSE Bug 1181852
- SUSE Bug 1186412
- SUSE Bug 1205048
Описание
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
Затронутые продукты
Ссылки
- CVE-2021-3468
- SUSE Bug 1184521