CVE-2017-6519 avahi


2017-12-30 18:17
2017-12-29 22:43
2017-10-01 00:03
2017-06-18 07:52
2017-06-16 19:22
2017-05-14 05:03
2017-05-02 05:03
2017-05-01 15:03


avahi-daemon in Avahi through 0.6.32 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
buster avahi None
jessie avahi None
sid avahi None
stretch avahi None
wheezy avahi None