This vulnerability exposes Avahi-daemon to potential DNS spoofing attacks by using a fixed source port for queries. However, the impact is limited because it only affects wide-area DNS and can be mitigated by forwarding queries to local DNS resolvers (e.g., systemd-resolved), which provide better randomization. The impact is primarily on systems actively using wide-area DNS, with .local mDNS being unaffected.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:11402 https://access.redhat.com/errata/RHSA-2025:11402
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:16441 https://access.redhat.com/errata/RHSA-2025:16441