Jump to content

Advisories MDVSA-2010:204: avahi


paul
 Share

Recommended Posts

A vulnerability was discovered and corrected in avahi:

 

The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon

in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial

of service (assertion failure and daemon exit) via a DNS packet with

an invalid checksum followed by a DNS packet with a valid checksum,

a different vulnerability than CVE-2008-5081 (CVE-2010-2244).

 

Packages for 2009.0 are provided as of the Extended Maintenance

Program. Please visit this link to learn more:

http://store.mandriva.com/product_info.php?cPath=149&products_id=490

 

The updated packages have been patched to correct this issue.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...