First published: Tue Mar 16 2021(Updated: )
A flaw was found in avahi deamon. Denial of service can be triggered by writing long lines to /run/avahi-daemon/socket resulting in an unresponsive busy-loop of the daemon. References: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984938">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984938</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1939614 is categorized as a denial of service vulnerability due to the busy-loop condition it can create in the avahi daemon.
To fix REDHAT-BUG-1939614, you should upgrade to the latest version of the avahi-daemon that addresses this vulnerability.
All versions of avahi-daemon prior to the patch that resolves REDHAT-BUG-1939614 are considered affected.
The vulnerability in REDHAT-BUG-1939614 is caused by the daemon entering a busy-loop state when long lines are written to /run/avahi-daemon/socket.
A temporary workaround for REDHAT-BUG-1939614 can be implemented by restricting the input to the avahi-daemon socket to prevent writing excessively long lines.