Red Hat Avahi Vulnerabilities