The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in
Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of
service (assertion failure and daemon exit) via a DNS packet with an
invalid checksum followed by a DNS packet with a valid checksum, a
different vulnerability than CVE-2008-5081.
There's already a fixed version (0.6.27) in the tree.
(In reply to comment #1)
> There's already a fixed version (0.6.27) in the tree.
Thanks, Sven. We'll need a stable version too, but we should wait on a new release/fix from bug 355583.
This issue was resolved and addressed in
GLSA 201110-17 at http://security.gentoo.org/glsa/glsa-201110-17.xml
by GLSA coordinator Tobias Heinlein (keytoaster).