avahi is vulnerable to denial of service (DoS). The vulnerability exists as a flaw was found in the way the Avahi daemon (avahi-daemon) processed multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet.
avahi.org/ticket/325
git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6
git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6
lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html
lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
openwall.com/lists/oss-security/2011/02/18/1
openwall.com/lists/oss-security/2011/02/18/4
osvdb.org/70948
secunia.com/advisories/43361
secunia.com/advisories/43465
secunia.com/advisories/43605
secunia.com/advisories/43673
secunia.com/advisories/44131
ubuntu.com/usn/usn-1084-1
www.debian.org/security/2011/dsa-2174
www.mandriva.com/security/advisories?name=MDVSA-2011:037
www.mandriva.com/security/advisories?name=MDVSA-2011:040
www.openwall.com/lists/oss-security/2011/02/22/9
www.redhat.com/support/errata/RHSA-2011-0436.html
www.redhat.com/support/errata/RHSA-2011-0779.html
www.securityfocus.com/bid/46446
www.vupen.com/english/advisories/2011/0448
www.vupen.com/english/advisories/2011/0499
www.vupen.com/english/advisories/2011/0511
www.vupen.com/english/advisories/2011/0565
www.vupen.com/english/advisories/2011/0601
www.vupen.com/english/advisories/2011/0670
www.vupen.com/english/advisories/2011/0969
xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/
access.redhat.com/errata/RHSA-2011:0436
access.redhat.com/errata/RHSA-2011:0779
access.redhat.com/security/cve/CVE-2011-1002
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=667187
exchange.xforce.ibmcloud.com/vulnerabilities/65524
exchange.xforce.ibmcloud.com/vulnerabilities/65525