This bug was fixed in the package avahi - 0.8-14ubuntu1

---------------
avahi (0.8-14ubuntu1) plucky; urgency=medium

  * Merge with Debian unstable (LP: #2090963). Remaining changes:
    - Disable lto, see https://bugzilla.redhat.com/show_bug.cgi?id=1907727
    - avahi-daemon-chroot-fix-bogus-assignments-in-assertions.patch,
      avahi-client-fix-resource-leak.patch: Issues discovered by static
      analysis (Upstream pull request #202)
    - SECURITY UPDATE: Reachable assertions exist in domain functions in
      avahi-common
      + debian/patches/CVE-2023-38470-2.patch: bail out when escaped
        labels can't fit into ret
      + CVE-2023-38470
    - SECURITY UPDATE: Reachable assertions exist in server functions in
      avahi-core
      + debian/patches/CVE-2023-38471-2.patch: core: return errors from
        avahi_server_set_host_name properly
      + CVE-2023-38471
  * Dropped changes, included in Debian:
    - SECURITY UPDATE: Reachable assertions exist in server functions of
      avahi-core
      + debian/patches/CVE-2023-38469-1.patch: reject overly long TXT
        resource records
      + debian/patches/CVE-2023-38469-2.patch: tests: pass overly long TXT
        resource records
      + CVE-2023-38469
    - SECURITY UPDATE: Reachable assertions exist in domain functions in
      avahi-common
      + debian/patches/CVE-2023-38470-1.patch: Ensure each label is at least
        one byte long
    - SECURITY UPDATE: Reachable assertions exist in server functions in
      avahi-core
      + debian/patches/CVE-2023-38471-1.patch: core: extract host name using
        avahi_unescape_label()
    - SECURITY UPDATE: Reachable assertions exist in dbus functions in
      avahi-daemon
      + debian/patches/CVE-2023-38472.patch: core: make sure there is rdata
        to process before parsing it
      + CVE-2023-38472
    - SECURITY UPDATE: Reachable assertions exist in alternative functions
      in avahi-common
      + debian/patches/CVE-2023-38473.patch: common: derive alternative host
        name from its unescaped version
      + CVE-2023-38473
  * Dropped changes, no longer needed:
    - avahi-autoipd: Demote isc-dhcp-client from Recommends to Suggests.
      Debian dropped isc-dhcp-client from Recommends altogether.

avahi (0.8-14) unstable; urgency=medium

  [ Simon McVittie ]
  * d/upstream/metadata: Add
  * d/watch: Use Github releases API
    (Closes: #1059615)
  * d/watch.devel: Add a secondary watch file that downloads release
    candidates.
    This is not used by default by infrastructure (we don't necessarily want
    to package every prerelease), but can be used via
    `uscan --watchfile debian/watch.devel`.
    Thanks to Marc Leeman
  * d/gbp.conf: Update packaging branch to debian/latest as per DEP-14
  * d/salsa-ci.yml: Add.
    Disable the cross-build test for now, this will need some more thought
    (perhaps building with nogir and/or nopython).

  [ Michael Biebl ]
  * Remove obsolete maintscript code from pre oldstable
  * Cleanup runtime / state directories more thoroughly on package purge.
    Those directories do not contain any valuable data that should be
    preserved beyond a package purge. So simplify the cleanup and do it more
    thoroughly by just removing all runtime and state files.
    While at it, correct an old changelog entry which referenced a wrong
    path. (Closes: #849454, #1051442)
  * Bump Standards-Version to 4.7.0
  * Drop isc-dhcp-client Recommends from avahi-autoipd.
    ISC DHCP client is no longer actively maintained, so stop recommending
    it. Still ship the integration hooks though for the time being.
    (Closes: #1064500)
  * avahi-discover: Fix invalid escape sequences.
    Patch cherry-picked from upstream Git. (Closes: #1085347)
  * core: make sure there is rdata to process before parsing it.
    Patch cherry-picked from upstream Git.
    (CVE-2023-38472, Closes: #1054879)
  * core: reject overly long TXT resource records.
    Patches cherry-picked from upstream Git.
    (CVE-2023-38469, Closes: #1054876)
  * Ensure each label is at least one byte long.
    Patch cherry-picked from upstream Git.
    (CVE-2023-38470, Closes: #1054877)
  * core: extract host name using avahi_unescape_label()
    Patch cherry-picked from upstream Git.
    (CVE-2023-38471, Closes: #1054878)
  * common: derive alternative host name from its unescaped version.
    Patch cherry-picked from upstream Git.
    (CVE-2023-38473, Closes: #1054880)

 -- Mateus Rodrigues de Morais <mateus.mor...@canonical.com>  Tue, 03
Dec 2024 17:57:06 -0300

** Changed in: avahi (Ubuntu)
       Status: Fix Committed => Fix Released

** Bug watch added: Red Hat Bugzilla #1907727
   https://bugzilla.redhat.com/show_bug.cgi?id=1907727

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38469

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38470

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38471

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38472

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38473

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to avahi in Ubuntu.
https://bugs.launchpad.net/bugs/2090963

Title:
  Please merge 0.8-14 into plucky

Status in avahi package in Ubuntu:
  Fix Released

Bug description:
  The upstream version 0.8-14 should be merged into plucky. The current
  version is 0.8-14.

  * PPA for review: https://launchpad.net/~mateus-
  morais/+archive/ubuntu/plucky-merges

  Note: this is a tracking bug

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/2090963/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to