-
avahi (0.8-10ubuntu1.1) mantic-security; urgency=medium
* SECURITY UPDATE: Reachable assertions exist in server functions of
avahi-core
- debian/patches/CVE-2023-38469-1.patch: reject overly long TXT
resource records
- debian/patches/CVE-2023-38469-2.patch: tests: pass overly long TXT
resource records
- CVE-2023-38469
* SECURITY UPDATE: Reachable assertions exist in domain functions in
avahi-common
- debian/patches/CVE-2023-38470-1.patch: Ensure each label is at least
one byte long
- debian/patches/CVE-2023-38470-2.patch: bail out when escaped labels
can't fit into ret
- CVE-2023-38470
* SECURITY UPDATE: Reachable assertions exist in server functions in
avahi-core
- debian/patches/CVE-2023-38471-1.patch: core: extract host name using
avahi_unescape_label()
- debian/patches/CVE-2023-38471-2.patch: core: return errors from
avahi_server_set_host_name properly
- CVE-2023-38471
* SECURITY UPDATE: Reachable assertions exist in dbus functions in
avahi-daemon
- debian/patches/CVE-2023-38472.patch: core: make sure there is rdata
to process before parsing it
- CVE-2023-38472
* SECURITY UPDATE: Reachable assertions exist in alternative functions
in avahi-common
- debian/patches/CVE-2023-38473.patch: common: derive alternative host
name from its unescaped version
- CVE-2023-38473
-- Nick Galanis <email address hidden> Mon, 20 Nov 2023 14:12:43 +0200
-
avahi (0.8-10ubuntu1) mantic; urgency=medium
* Merge with Debian unstable (LP: #2020383). Remaining changes:
+ Disable lto, see https://bugzilla.redhat.com/show_bug.cgi?id=1907727
+ avahi-daemon-chroot-fix-bogus-assignments-in-assertions.patch,
avahi-client-fix-resource-leak.patch: Issues discovered by static analysis
(Upstream pull request #202)
* Dropped changes, included in Debian:
+ avoid-infinite-loop-in-avahi-daemon-by-handling-hup-event-in-client-work.patch:
Avoid infinite-loop in avahi-daemon by handling HUP event in client_work()
(Upstream pull request #330)
* Dropped changes, no longer needed:
+ debian/avahi-daemon.postinst: remove the deprecated conffiles
if-up/down entries on upgrade, use a simple logic and no
dpkg-maintscript-helper since there is no configuration worth saving
(All releases from which upgrades are supported have a new enough version)
-- Nick Rosbrook <email address hidden> Tue, 23 May 2023 10:02:00 -0400
-
avahi (0.8-6ubuntu1) kinetic; urgency=medium
* Merge from Debian unstable, remaining changes:
+ debian/avahi-daemon.postinst: remove the deprecated conffiles
if-up/down entries on upgrade, use a simple logic and no
dpkg-maintscript-helper since there is no configuration worth saving
+ Disable lto, see https://bugzilla.redhat.com/show_bug.cgi?id=1907727
+ avahi-daemon-chroot-fix-bogus-assignments-in-assertions.patch,
avahi-client-fix-resource-leak.patch: Issues discovered by static analysis
(Upstream pull request #202)
+ avoid-infinite-loop-in-avahi-daemon-by-handling-hup-event-in-client-work.patch:
Avoid infinite-loop in avahi-daemon by handling HUP event in client_work()
(Upstream pull request #330)
* Dropped changes, included in Debian:
+ SECURITY UPDATE: DoS in avahi_s_host_name_resolver_start
avahi (0.8-6) unstable; urgency=medium
[ Luca Boccassi ]
* avahi-daemon: depend on default-dbus-system-bus | dbus-system-bus.
This allows the reference implementation to be removed if using a
different system bus implementation such as dbus-broker.
[smcv: Adjust commit message]
[ Simon McVittie ]
* Add patch to fix display of URLs containing '&' in avahi-discover
* Standards-Version: 4.6.0 (no changes required)
* Use recommended debhelper compat level 13
[ Michael Biebl ]
* Do not disable timeout cleanup on watch cleanup.
This was causing timeouts to never be removed from the linked list that
tracks them, resulting in both memory and CPU usage to grow larger over
time. Thanks to Gustavo Noronha Silva (Closes: #993051)
* Drop obsolete lsb-base Depends
* Fix NULL pointer crashes when trying to resolve badly-formatted hostnames.
Fixes a local DoS in avahi-daemon that can be triggered by trying to
resolve badly-formatted hostnames on the /run/avahi-daemon/socket
interface. (CVE-2021-3502, Closes: #986018)
-- Graham Inggs <email address hidden> Mon, 22 Aug 2022 12:33:46 +0000