Synopsis: Moderate: avahi security update Issue date: 2011-04-12 CVE Names: CVE-2011-1002 A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) After installing the update, avahi-daemon will be restarted automatically. SL 5.x SRPMS: avahi-0.6.16-10.el5_6.src.rpm i386: avahi-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.i386.rpm avahi-devel-0.6.16-10.el5_6.i386.rpm avahi-glib-0.6.16-10.el5_6.i386.rpm avahi-glib-devel-0.6.16-10.el5_6.i386.rpm avahi-qt3-0.6.16-10.el5_6.i386.rpm avahi-qt3-devel-0.6.16-10.el5_6.i386.rpm avahi-tools-0.6.16-10.el5_6.i386.rpm x86_64: avahi-0.6.16-10.el5_6.i386.rpm avahi-0.6.16-10.el5_6.x86_64.rpm avahi-compat-howl-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-0.6.16-10.el5_6.x86_64.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.x86_64.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.x86_64.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.x86_64.rpm avahi-devel-0.6.16-10.el5_6.i386.rpm avahi-devel-0.6.16-10.el5_6.x86_64.rpm avahi-glib-0.6.16-10.el5_6.i386.rpm avahi-glib-0.6.16-10.el5_6.x86_64.rpm avahi-glib-devel-0.6.16-10.el5_6.i386.rpm avahi-glib-devel-0.6.16-10.el5_6.x86_64.rpm avahi-qt3-0.6.16-10.el5_6.i386.rpm avahi-qt3-0.6.16-10.el5_6.x86_64.rpm avahi-qt3-devel-0.6.16-10.el5_6.i386.rpm avahi-qt3-devel-0.6.16-10.el5_6.x86_64.rpm avahi-tools-0.6.16-10.el5_6.x86_64.rpm -Connie Sieh -Troy Dawson