Revision Date: | 2021-06-03 | Version: | 1 |
Title: | Security update for avahi (Important) |
Description: |
This update for avahi fixes the following issues:
- CVE-2021-3468: avoid infinite loop by handling HUP event in client_work (bsc#1184521). - CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827) - Update avahi-daemon-check-dns.sh from Debian. Our previous version relied on ifconfig, route, and init.d. - Add sudo to requires: used to drop privileges.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1180827 1184521 CVE-2015-0840 CVE-2016-0742 CVE-2016-0746 CVE-2016-0747 CVE-2016-4450 CVE-2017-7529 CVE-2018-16843 CVE-2018-16844 CVE-2018-16845 CVE-2019-20372 CVE-2019-9511 CVE-2019-9513 CVE-2019-9516 CVE-2021-26720 CVE-2021-3468
|
Platform(s): | SUSE Linux Enterprise Module for Development Tools 15 SP2 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP2 SUSE Linux Enterprise Module for Server Applications 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed AND Package Information
dpkg-1.19.0.4-2 is installed
OR dpkg-devel-1.19.0.4-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed
AND Package Information
nginx-1.16.1-1 is installed
OR nginx-source-1.16.1-1 is installed
|