SUSE-SU-2021:0551-1: moderate: Security update for avahi

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Feb 23 14:15:05 UTC 2021


   SUSE Security Update: Security update for avahi
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:0551-1
Rating:             moderate
References:         #1180827 
Cross-References:   CVE-2021-26720
CVSS scores:
                    CVE-2021-26720 (SUSE): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

Affected Products:
                    SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
                    SUSE Linux Enterprise Module for Desktop Applications 15-SP2
                    SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for avahi fixes the following issues:

   - CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh
     (bsc#1180827)
   - Update avahi-daemon-check-dns.sh from Debian. Our previous version
     relied on ifconfig, route, and init.d.
   - Add sudo to requires: used to drop privileges.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-551=1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-551=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-551=1



Package List:

   - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (aarch64 ppc64le s390x x86_64):

      avahi-debuginfo-0.7-3.6.1
      avahi-debugsource-0.7-3.6.1
      python3-avahi-0.7-3.6.1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (aarch64 ppc64le s390x x86_64):

      avahi-autoipd-0.7-3.6.1
      avahi-autoipd-debuginfo-0.7-3.6.1
      avahi-debuginfo-0.7-3.6.1
      avahi-debugsource-0.7-3.6.1
      avahi-glib2-debugsource-0.7-3.6.1
      avahi-utils-gtk-0.7-3.6.1
      avahi-utils-gtk-debuginfo-0.7-3.6.1
      libavahi-gobject-devel-0.7-3.6.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):

      avahi-0.7-3.6.1
      avahi-compat-howl-devel-0.7-3.6.1
      avahi-compat-mDNSResponder-devel-0.7-3.6.1
      avahi-debuginfo-0.7-3.6.1
      avahi-debugsource-0.7-3.6.1
      avahi-glib2-debugsource-0.7-3.6.1
      avahi-utils-0.7-3.6.1
      avahi-utils-debuginfo-0.7-3.6.1
      libavahi-client3-0.7-3.6.1
      libavahi-client3-debuginfo-0.7-3.6.1
      libavahi-common3-0.7-3.6.1
      libavahi-common3-debuginfo-0.7-3.6.1
      libavahi-core7-0.7-3.6.1
      libavahi-core7-debuginfo-0.7-3.6.1
      libavahi-devel-0.7-3.6.1
      libavahi-glib-devel-0.7-3.6.1
      libavahi-glib1-0.7-3.6.1
      libavahi-glib1-debuginfo-0.7-3.6.1
      libavahi-gobject0-0.7-3.6.1
      libavahi-gobject0-debuginfo-0.7-3.6.1
      libavahi-ui-gtk3-0-0.7-3.6.1
      libavahi-ui-gtk3-0-debuginfo-0.7-3.6.1
      libavahi-ui0-0.7-3.6.1
      libavahi-ui0-debuginfo-0.7-3.6.1
      libdns_sd-0.7-3.6.1
      libdns_sd-debuginfo-0.7-3.6.1
      libhowl0-0.7-3.6.1
      libhowl0-debuginfo-0.7-3.6.1
      typelib-1_0-Avahi-0_6-0.7-3.6.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):

      avahi-lang-0.7-3.6.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):

      avahi-32bit-debuginfo-0.7-3.6.1
      libavahi-client3-32bit-0.7-3.6.1
      libavahi-client3-32bit-debuginfo-0.7-3.6.1
      libavahi-common3-32bit-0.7-3.6.1
      libavahi-common3-32bit-debuginfo-0.7-3.6.1


References:

   https://www.suse.com/security/cve/CVE-2021-26720.html
   https://bugzilla.suse.com/1180827



More information about the sle-security-updates mailing list