CVE-2021-3502

Summary

CVECVE-2021-3502
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-05-07 12:15:00 UTC
Updated2023-11-07 03:38:00 UTC
DescriptionA flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.

Risk And Classification

Problem Types: CWE-617

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Avahi Avahi 0.8-5 All All All

References

ReferenceSourceLinkTags
reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames (CVE-2021-3502) · Issue #338 · lathiat/avahi · GitHub MISC github.com
1946914 – (CVE-2021-3502) CVE-2021-3502 avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames MISC bugzilla.redhat.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 161082 Oracle Enterprise Linux Security Update for avahi (ELSA-2023-6707)
  • 181013 Debian Security Update for avahi (CVE-2021-3502)
  • 198430 Ubuntu Security Notification for Avahi vulnerabilities (USN-5008-1)
  • 242395 Red Hat Update for avahi (RHSA-2023:6707)
  • 503098 Alpine Linux Security Update for avahi
  • 505850 Alpine Linux Security Update for avahi
  • 941371 AlmaLinux Security Update for avahi (ALSA-2023:6707)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report