Home / mailings [SECURITY] [DSA 2174-1] avahi security update
Posted on 26 February 2011
Debian Security Advisory-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2174-1 security@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
February 26, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : avahi
Vulnerability : denial of service
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-1002
Debian Bug : 614785
It was discovered that avahi, an implementation of the zeroconf protocol,
can be crashed remotely by a single UDP packet, which may result in a
denial of service.
For the oldstable distribution (lenny), this problem has been fixed in
version 0.6.23-3lenny3.
For the stable distribution (squeeze), this problem has been fixed in
version 0.6.27-2+squeeze1.
For the testing (wheezy) and unstable distribution (sid), this problem
has been fixed in version 0.6.28-4.
We recommend that you upgrade your avahi packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org