vulnerability
SUSE: CVE-2021-3502: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | May 7, 2021 | Oct 26, 2022 | Jun 13, 2023 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
May 7, 2021
Added
Oct 26, 2022
Modified
Jun 13, 2023
Description
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
Solutions
suse-upgrade-avahisuse-upgrade-avahi-autoipdsuse-upgrade-avahi-compat-howl-develsuse-upgrade-avahi-compat-mdnsresponder-develsuse-upgrade-avahi-langsuse-upgrade-avahi-utilssuse-upgrade-avahi-utils-gtksuse-upgrade-libavahi-client3suse-upgrade-libavahi-client3-32bitsuse-upgrade-libavahi-common3suse-upgrade-libavahi-common3-32bitsuse-upgrade-libavahi-core7suse-upgrade-libavahi-develsuse-upgrade-libavahi-glib-develsuse-upgrade-libavahi-glib1suse-upgrade-libavahi-gobject-develsuse-upgrade-libavahi-gobject0suse-upgrade-libavahi-libevent1suse-upgrade-libavahi-ui-gtk3-0suse-upgrade-libdns_sdsuse-upgrade-libhowl0suse-upgrade-typelib-1_0-avahi-0_6
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.