Synopsis: Moderate: avahi security update Issue date: 2009-01-12 CVE Names: CVE-2008-5081 Hugo Dias discovered a denial of service flaw in avahi-daemon. A remote attacker on the same local area network (LAN) could send a specially-crafted mDNS (Multicast DNS) packet that would cause avahi-daemon to exit unexpectedly due to a failed assertion check. (CVE-2008-5081) After installing the update, the avahi-daemon will be restarted automatically. SL 5.x SRPMS: avahi-0.6.16-1.el5_2.1.src.rpm i386: avahi-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.i386.rpm avahi-devel-0.6.16-1.el5_2.1.i386.rpm avahi-glib-0.6.16-1.el5_2.1.i386.rpm avahi-glib-devel-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.i386.rpm avahi-tools-0.6.16-1.el5_2.1.i386.rpm x86_64: avahi-0.6.16-1.el5_2.1.i386.rpm avahi-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-howl-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-devel-0.6.16-1.el5_2.1.i386.rpm avahi-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-glib-0.6.16-1.el5_2.1.i386.rpm avahi-glib-0.6.16-1.el5_2.1.x86_64.rpm avahi-glib-devel-0.6.16-1.el5_2.1.i386.rpm avahi-glib-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-qt3-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-0.6.16-1.el5_2.1.x86_64.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-tools-0.6.16-1.el5_2.1.x86_64.rpm -Connie Sieh -Troy Dawson