The sequential increment of DNS transaction IDs makes Avahi vulnerable to DNS spoofing, allowing attackers to inject malicious DNS records. This can compromise the integrity of DNS responses, redirecting users to potentially harmful domains. This vulnerability poses a greater risk as it directly undermines the integrity of DNS resolution, affecting all systems using Avahi for wide-area DNS queries unless mitigations are applied.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7437 https://access.redhat.com/errata/RHSA-2025:7437