vulnerability
Red Hat: CVE-2021-3502: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | May 7, 2021 | Nov 8, 2023 | Sep 1, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
May 7, 2021
Added
Nov 8, 2023
Modified
Sep 1, 2025
Description
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
Solutions
redhat-upgrade-avahiredhat-upgrade-avahi-autoipd-debuginforedhat-upgrade-avahi-compat-howlredhat-upgrade-avahi-compat-howl-debuginforedhat-upgrade-avahi-compat-howl-develredhat-upgrade-avahi-compat-libdns_sdredhat-upgrade-avahi-compat-libdns_sd-debuginforedhat-upgrade-avahi-compat-libdns_sd-develredhat-upgrade-avahi-debuginforedhat-upgrade-avahi-debugsourceredhat-upgrade-avahi-develredhat-upgrade-avahi-dnsconfd-debuginforedhat-upgrade-avahi-glibredhat-upgrade-avahi-glib-debuginforedhat-upgrade-avahi-glib-develredhat-upgrade-avahi-gobject-debuginforedhat-upgrade-avahi-libsredhat-upgrade-avahi-libs-debuginforedhat-upgrade-avahi-toolsredhat-upgrade-avahi-tools-debuginforedhat-upgrade-avahi-ui-debuginforedhat-upgrade-avahi-ui-gtk3-debuginforedhat-upgrade-avahi-ui-tools-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.