Описание
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 7 | avahi | Out of support scope | ||
| Red Hat Enterprise Linux 8 | avahi | Will not fix | ||
| Red Hat OpenShift Container Platform 4 | rhcos | Fix deferred | ||
| Red Hat Enterprise Linux 10 | avahi | Fixed | RHSA-2025:16441 | 23.09.2025 |
| Red Hat Enterprise Linux 9 | avahi | Fixed | RHSA-2025:11402 | 21.07.2025 |
| Red Hat Enterprise Linux 9 | avahi | Fixed | RHSA-2025:11402 | 21.07.2025 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-330
https://bugzilla.redhat.com/show_bug.cgi?id=2326418avahi: Avahi Wide-Area DNS Uses Constant Source Port
5.3 Medium
CVSS3
Связанные уязвимости
CVSS3: 5.3
ubuntu
12 месяцев назад
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
CVSS3: 5.3
nvd
12 месяцев назад
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
CVSS3: 5.3
debian
12 месяцев назад
A flaw was found in Avahi-daemon, which relies on fixed source ports f ...
5.3 Medium
CVSS3