This bug was fixed in the package avahi - 0.8-14ubuntu1 --------------- avahi (0.8-14ubuntu1) plucky; urgency=medium
* Merge with Debian unstable (LP: #2090963). Remaining changes: - Disable lto, see https://bugzilla.redhat.com/show_bug.cgi?id=1907727 - avahi-daemon-chroot-fix-bogus-assignments-in-assertions.patch, avahi-client-fix-resource-leak.patch: Issues discovered by static analysis (Upstream pull request #202) - SECURITY UPDATE: Reachable assertions exist in domain functions in avahi-common + debian/patches/CVE-2023-38470-2.patch: bail out when escaped labels can't fit into ret + CVE-2023-38470 - SECURITY UPDATE: Reachable assertions exist in server functions in avahi-core + debian/patches/CVE-2023-38471-2.patch: core: return errors from avahi_server_set_host_name properly + CVE-2023-38471 * Dropped changes, included in Debian: - SECURITY UPDATE: Reachable assertions exist in server functions of avahi-core + debian/patches/CVE-2023-38469-1.patch: reject overly long TXT resource records + debian/patches/CVE-2023-38469-2.patch: tests: pass overly long TXT resource records + CVE-2023-38469 - SECURITY UPDATE: Reachable assertions exist in domain functions in avahi-common + debian/patches/CVE-2023-38470-1.patch: Ensure each label is at least one byte long - SECURITY UPDATE: Reachable assertions exist in server functions in avahi-core + debian/patches/CVE-2023-38471-1.patch: core: extract host name using avahi_unescape_label() - SECURITY UPDATE: Reachable assertions exist in dbus functions in avahi-daemon + debian/patches/CVE-2023-38472.patch: core: make sure there is rdata to process before parsing it + CVE-2023-38472 - SECURITY UPDATE: Reachable assertions exist in alternative functions in avahi-common + debian/patches/CVE-2023-38473.patch: common: derive alternative host name from its unescaped version + CVE-2023-38473 * Dropped changes, no longer needed: - avahi-autoipd: Demote isc-dhcp-client from Recommends to Suggests. Debian dropped isc-dhcp-client from Recommends altogether. avahi (0.8-14) unstable; urgency=medium [ Simon McVittie ] * d/upstream/metadata: Add * d/watch: Use Github releases API (Closes: #1059615) * d/watch.devel: Add a secondary watch file that downloads release candidates. This is not used by default by infrastructure (we don't necessarily want to package every prerelease), but can be used via `uscan --watchfile debian/watch.devel`. Thanks to Marc Leeman * d/gbp.conf: Update packaging branch to debian/latest as per DEP-14 * d/salsa-ci.yml: Add. Disable the cross-build test for now, this will need some more thought (perhaps building with nogir and/or nopython). [ Michael Biebl ] * Remove obsolete maintscript code from pre oldstable * Cleanup runtime / state directories more thoroughly on package purge. Those directories do not contain any valuable data that should be preserved beyond a package purge. So simplify the cleanup and do it more thoroughly by just removing all runtime and state files. While at it, correct an old changelog entry which referenced a wrong path. (Closes: #849454, #1051442) * Bump Standards-Version to 4.7.0 * Drop isc-dhcp-client Recommends from avahi-autoipd. ISC DHCP client is no longer actively maintained, so stop recommending it. Still ship the integration hooks though for the time being. (Closes: #1064500) * avahi-discover: Fix invalid escape sequences. Patch cherry-picked from upstream Git. (Closes: #1085347) * core: make sure there is rdata to process before parsing it. Patch cherry-picked from upstream Git. (CVE-2023-38472, Closes: #1054879) * core: reject overly long TXT resource records. Patches cherry-picked from upstream Git. (CVE-2023-38469, Closes: #1054876) * Ensure each label is at least one byte long. Patch cherry-picked from upstream Git. (CVE-2023-38470, Closes: #1054877) * core: extract host name using avahi_unescape_label() Patch cherry-picked from upstream Git. (CVE-2023-38471, Closes: #1054878) * common: derive alternative host name from its unescaped version. Patch cherry-picked from upstream Git. (CVE-2023-38473, Closes: #1054880) -- Mateus Rodrigues de Morais <mateus.mor...@canonical.com> Tue, 03 Dec 2024 17:57:06 -0300 ** Changed in: avahi (Ubuntu) Status: Fix Committed => Fix Released ** Bug watch added: Red Hat Bugzilla #1907727 https://bugzilla.redhat.com/show_bug.cgi?id=1907727 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38469 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38470 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38471 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38472 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38473 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to avahi in Ubuntu. https://bugs.launchpad.net/bugs/2090963 Title: Please merge 0.8-14 into plucky Status in avahi package in Ubuntu: Fix Released Bug description: The upstream version 0.8-14 should be merged into plucky. The current version is 0.8-14. * PPA for review: https://launchpad.net/~mateus- morais/+archive/ubuntu/plucky-merges Note: this is a tracking bug To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/2090963/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp