First published: Thu Jun 01 2023(Updated: )
It was discovered that Avahi incorrectly handled certain DBus messages. A local attacker could possibly use this issue to cause Avahi to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/avahi-daemon | <0.8-6ubuntu1.23.04.1 | 0.8-6ubuntu1.23.04.1 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/avahi-daemon | <0.8-6ubuntu1.22.10.1 | 0.8-6ubuntu1.22.10.1 |
Ubuntu Ubuntu | =22.10 | |
All of | ||
ubuntu/avahi-daemon | <0.8-5ubuntu5.1 | 0.8-5ubuntu5.1 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/avahi-daemon | <0.7-4ubuntu7.2 | 0.7-4ubuntu7.2 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Avahi vulnerability is USN-6129-1.
The severity of the Avahi vulnerability is not specified in the information provided.
This vulnerability could be exploited by a local attacker to cause Avahi to crash, resulting in a denial of service.
The versions of Avahi affected by this vulnerability are 0.8-6ubuntu1.23.04.1, 0.8-6ubuntu1.22.10.1, 0.8-5ubuntu5.1, and 0.7-4ubuntu7.2.
To fix the Avahi vulnerability, update Avahi to version 0.8-6ubuntu1.23.04.1 or later, 0.8-6ubuntu1.22.10.1 or later, 0.8-5ubuntu5.1 or later, or 0.7-4ubuntu7.2 or later.