Описание
ELSA-2010-0528: avahi security update (MODERATE)
[0.6.16-9.el5]
- Related: #609318
- Fixes CVE-2010-2244
[0.6.16-8.el5]
- Related: #609318
- Fixes CVE-2010-2244
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
avahi
0.6.16-9.el5_5
avahi-compat-howl
0.6.16-9.el5_5
avahi-compat-howl-devel
0.6.16-9.el5_5
avahi-compat-libdns_sd
0.6.16-9.el5_5
avahi-compat-libdns_sd-devel
0.6.16-9.el5_5
avahi-devel
0.6.16-9.el5_5
avahi-glib
0.6.16-9.el5_5
avahi-glib-devel
0.6.16-9.el5_5
avahi-qt3
0.6.16-9.el5_5
avahi-qt3-devel
0.6.16-9.el5_5
avahi-tools
0.6.16-9.el5_5
Oracle Linux x86_64
avahi
0.6.16-9.el5_5
avahi-compat-howl
0.6.16-9.el5_5
avahi-compat-howl-devel
0.6.16-9.el5_5
avahi-compat-libdns_sd
0.6.16-9.el5_5
avahi-compat-libdns_sd-devel
0.6.16-9.el5_5
avahi-devel
0.6.16-9.el5_5
avahi-glib
0.6.16-9.el5_5
avahi-glib-devel
0.6.16-9.el5_5
avahi-qt3
0.6.16-9.el5_5
avahi-qt3-devel
0.6.16-9.el5_5
avahi-tools
0.6.16-9.el5_5
Oracle Linux i386
avahi
0.6.16-9.el5_5
avahi-compat-howl
0.6.16-9.el5_5
avahi-compat-howl-devel
0.6.16-9.el5_5
avahi-compat-libdns_sd
0.6.16-9.el5_5
avahi-compat-libdns_sd-devel
0.6.16-9.el5_5
avahi-devel
0.6.16-9.el5_5
avahi-glib
0.6.16-9.el5_5
avahi-glib-devel
0.6.16-9.el5_5
avahi-qt3
0.6.16-9.el5_5
avahi-qt3-devel
0.6.16-9.el5_5
avahi-tools
0.6.16-9.el5_5
Связанные CVE
Связанные уязвимости
The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in ...
The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.