First published: Wed Apr 07 2021(Updated: )
A local Dos in avahi-daemon that can be triggered by trying to resolve badly-formatted hostnames on the /run/avahi-daemon/socket interface. References: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986018">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986018</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1946914 is classified as a local denial of service vulnerability.
To fix REDHAT-BUG-1946914, ensure that you update avahi-daemon to the latest available version that addresses this issue.
Users and systems running avahi-daemon with access to the local socket interface are affected by REDHAT-BUG-1946914.
The component involved in REDHAT-BUG-1946914 is the avahi-daemon.
No, REDHAT-BUG-1946914 requires local access to exploit, making it a local denial of service issue.