<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">avahi-0.8-7.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10643</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">avahi-0.8-7.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the avahi-0.8-7.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10643</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10643</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-5461/</URL>
      <Description>SUSE CVE CVE-2006-5461 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-3372/</URL>
      <Description>SUSE CVE CVE-2007-3372 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-5081/</URL>
      <Description>SUSE CVE CVE-2008-5081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6519/</URL>
      <Description>SUSE CVE CVE-2017-6519 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000845/</URL>
      <Description>SUSE CVE CVE-2018-1000845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-26720/</URL>
      <Description>SUSE CVE CVE-2021-26720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3468/</URL>
      <Description>SUSE CVE CVE-2021-3468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3502/</URL>
      <Description>SUSE CVE CVE-2021-3502 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="avahi-0.8-7.2">
      <FullProductName ProductID="avahi-0.8-7.2">avahi-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="avahi-autoipd-0.8-7.2">
      <FullProductName ProductID="avahi-autoipd-0.8-7.2">avahi-autoipd-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="avahi-compat-howl-devel-0.8-7.2">
      <FullProductName ProductID="avahi-compat-howl-devel-0.8-7.2">avahi-compat-howl-devel-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="avahi-compat-mDNSResponder-devel-0.8-7.2">
      <FullProductName ProductID="avahi-compat-mDNSResponder-devel-0.8-7.2">avahi-compat-mDNSResponder-devel-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="avahi-lang-0.8-7.2">
      <FullProductName ProductID="avahi-lang-0.8-7.2">avahi-lang-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="avahi-utils-0.8-7.2">
      <FullProductName ProductID="avahi-utils-0.8-7.2">avahi-utils-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-client3-0.8-7.2">
      <FullProductName ProductID="libavahi-client3-0.8-7.2">libavahi-client3-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-client3-32bit-0.8-7.2">
      <FullProductName ProductID="libavahi-client3-32bit-0.8-7.2">libavahi-client3-32bit-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-common3-0.8-7.2">
      <FullProductName ProductID="libavahi-common3-0.8-7.2">libavahi-common3-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-common3-32bit-0.8-7.2">
      <FullProductName ProductID="libavahi-common3-32bit-0.8-7.2">libavahi-common3-32bit-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-core7-0.8-7.2">
      <FullProductName ProductID="libavahi-core7-0.8-7.2">libavahi-core7-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-devel-0.8-7.2">
      <FullProductName ProductID="libavahi-devel-0.8-7.2">libavahi-devel-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-libevent1-0.8-7.2">
      <FullProductName ProductID="libavahi-libevent1-0.8-7.2">libavahi-libevent1-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdns_sd-0.8-7.2">
      <FullProductName ProductID="libdns_sd-0.8-7.2">libdns_sd-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdns_sd-32bit-0.8-7.2">
      <FullProductName ProductID="libdns_sd-32bit-0.8-7.2">libdns_sd-32bit-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libhowl0-0.8-7.2">
      <FullProductName ProductID="libhowl0-0.8-7.2">libhowl0-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python36-avahi-0.8-7.2">
      <FullProductName ProductID="python36-avahi-0.8-7.2">python36-avahi-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python38-avahi-0.8-7.2">
      <FullProductName ProductID="python38-avahi-0.8-7.2">python38-avahi-0.8-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python39-avahi-0.8-7.2">
      <FullProductName ProductID="python39-avahi-0.8-7.2">python39-avahi-0.8-7.2</FullProductName>
    </Branch>
    <Relationship ProductReference="avahi-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:avahi-0.8-7.2">avahi-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="avahi-autoipd-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:avahi-autoipd-0.8-7.2">avahi-autoipd-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="avahi-compat-howl-devel-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2">avahi-compat-howl-devel-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="avahi-compat-mDNSResponder-devel-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2">avahi-compat-mDNSResponder-devel-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="avahi-lang-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:avahi-lang-0.8-7.2">avahi-lang-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="avahi-utils-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:avahi-utils-0.8-7.2">avahi-utils-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-client3-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavahi-client3-0.8-7.2">libavahi-client3-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-client3-32bit-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2">libavahi-client3-32bit-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-common3-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavahi-common3-0.8-7.2">libavahi-common3-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-common3-32bit-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2">libavahi-common3-32bit-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-core7-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavahi-core7-0.8-7.2">libavahi-core7-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-devel-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavahi-devel-0.8-7.2">libavahi-devel-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-libevent1-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2">libavahi-libevent1-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdns_sd-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libdns_sd-0.8-7.2">libdns_sd-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdns_sd-32bit-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2">libdns_sd-32bit-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libhowl0-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libhowl0-0.8-7.2">libhowl0-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python36-avahi-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python36-avahi-0.8-7.2">python36-avahi-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python38-avahi-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python38-avahi-0.8-7.2">python38-avahi-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-avahi-0.8-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python39-avahi-0.8-7.2">python39-avahi-0.8-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.</Note>
    </Notes>
    <CVE>CVE-2006-5461</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-5461.html</URL>
        <Description>CVE-2006-5461</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/216219</URL>
        <Description>SUSE Bug 216219</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.</Note>
    </Notes>
    <CVE>CVE-2007-3372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-3372.html</URL>
        <Description>CVE-2007-3372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/287123</URL>
        <Description>SUSE Bug 287123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.</Note>
    </Notes>
    <CVE>CVE-2008-5081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-5081.html</URL>
        <Description>CVE-2008-5081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/459007</URL>
        <Description>SUSE Bug 459007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/646961</URL>
        <Description>SUSE Bug 646961</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.</Note>
    </Notes>
    <CVE>CVE-2017-6519</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6519.html</URL>
        <Description>CVE-2017-6519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037001</URL>
        <Description>SUSE Bug 1037001</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultID: CVE-2017-6519.  Reason: This candidate is a duplicate of CVE-2017-6519.  Notes: All CVE users should reference CVE-2017-6519 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2018-1000845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000845.html</URL>
        <Description>CVE-2018-1000845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120281</URL>
        <Description>SUSE Bug 1120281</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.</Note>
    </Notes>
    <CVE>CVE-2021-26720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-26720.html</URL>
        <Description>CVE-2021-26720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180827</URL>
        <Description>SUSE Bug 1180827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180865</URL>
        <Description>SUSE Bug 1180865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181852</URL>
        <Description>SUSE Bug 1181852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186412</URL>
        <Description>SUSE Bug 1186412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205048</URL>
        <Description>SUSE Bug 1205048</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.</Note>
    </Notes>
    <CVE>CVE-2021-3468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3468.html</URL>
        <Description>CVE-2021-3468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184521</URL>
        <Description>SUSE Bug 1184521</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.</Note>
    </Notes>
    <CVE>CVE-2021-3502</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-autoipd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-howl-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-compat-mDNSResponder-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-lang-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:avahi-utils-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-client3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-common3-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-core7-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-devel-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavahi-libevent1-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libdns_sd-32bit-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhowl0-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python36-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-avahi-0.8-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-avahi-0.8-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3502.html</URL>
        <Description>CVE-2021-3502</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184846</URL>
        <Description>SUSE Bug 1184846</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
