Описание
ELSA-2025-7437: avahi security update (MODERATE)
[0.8-22]
- Fix CVE-2024-52616 (RHEL-67722)
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
avahi-compat-howl
0.8-22.el9_6
avahi-compat-howl-devel
0.8-22.el9_6
avahi-compat-libdns_sd
0.8-22.el9_6
avahi-compat-libdns_sd-devel
0.8-22.el9_6
avahi-devel
0.8-22.el9_6
avahi-glib-devel
0.8-22.el9_6
avahi-gobject
0.8-22.el9_6
avahi-gobject-devel
0.8-22.el9_6
avahi-libs
0.8-22.el9_6
avahi-autoipd
0.8-22.el9_6
avahi-glib
0.8-22.el9_6
avahi-tools
0.8-22.el9_6
avahi
0.8-22.el9_6
Oracle Linux x86_64
avahi
0.8-22.el9_6
avahi-libs
0.8-22.el9_6
avahi-autoipd
0.8-22.el9_6
avahi-glib
0.8-22.el9_6
avahi-tools
0.8-22.el9_6
avahi-compat-howl
0.8-22.el9_6
avahi-compat-howl-devel
0.8-22.el9_6
avahi-compat-libdns_sd
0.8-22.el9_6
avahi-compat-libdns_sd-devel
0.8-22.el9_6
avahi-devel
0.8-22.el9_6
avahi-glib-devel
0.8-22.el9_6
avahi-gobject
0.8-22.el9_6
avahi-gobject-devel
0.8-22.el9_6
Связанные CVE
Связанные уязвимости
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
A flaw was found in the Avahi-daemon, where it initializes DNS transac ...