Описание
Security update for avahi
This update for avahi fixes the following issues:
- CVE-2024-52615: wide-area DNS uses constant source port for queries and can expose the Avahi-daemon to DNS spoofing attacks (bsc#1233421).
Список пакетов
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
avahi-0.6.32-32.33.1
avahi-compat-howl-devel-0.6.32-32.33.1
avahi-compat-mDNSResponder-devel-0.6.32-32.33.1
avahi-lang-0.6.32-32.33.1
avahi-utils-0.6.32-32.33.1
libavahi-client3-0.6.32-32.33.1
libavahi-client3-32bit-0.6.32-32.33.1
libavahi-common3-0.6.32-32.33.1
libavahi-common3-32bit-0.6.32-32.33.1
libavahi-core7-0.6.32-32.33.1
libavahi-devel-0.6.32-32.33.1
libdns_sd-0.6.32-32.33.1
libdns_sd-32bit-0.6.32-32.33.1
Ссылки
- Link for SUSE-SU-2025:03332-1
- E-Mail link for SUSE-SU-2025:03332-1
- SUSE Security Ratings
- SUSE Bug 1233421
- SUSE CVE CVE-2024-52615 page
Описание
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Затронутые продукты
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:avahi-0.6.32-32.33.1
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:avahi-compat-howl-devel-0.6.32-32.33.1
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:avahi-compat-mDNSResponder-devel-0.6.32-32.33.1
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:avahi-lang-0.6.32-32.33.1
Ссылки
- CVE-2024-52615
- SUSE Bug 1233421