Описание
Security update for avahi
This update for avahi fixes the following issues:
- CVE-2024-52615: Fixed DNS spoofing (bsc#1233421)
Список пакетов
openSUSE Leap 16.0
avahi-0.8-160000.3.1
avahi-autoipd-0.8-160000.3.1
avahi-compat-howl-devel-0.8-160000.3.1
avahi-compat-mDNSResponder-devel-0.8-160000.3.1
avahi-lang-0.8-160000.3.1
avahi-utils-0.8-160000.3.1
avahi-utils-gtk-0.8-160000.3.1
libavahi-client3-0.8-160000.3.1
libavahi-common3-0.8-160000.3.1
libavahi-core7-0.8-160000.3.1
libavahi-devel-0.8-160000.3.1
libavahi-glib-devel-0.8-160000.3.1
libavahi-glib1-0.8-160000.3.1
libavahi-gobject-devel-0.8-160000.3.1
libavahi-gobject0-0.8-160000.3.1
libavahi-libevent1-0.8-160000.3.1
libavahi-qt6-1-0.8-160000.3.1
libavahi-qt6-devel-0.8-160000.3.1
libavahi-ui-gtk3-0-0.8-160000.3.1
libdns_sd-0.8-160000.3.1
libhowl0-0.8-160000.3.1
python3-avahi-gtk-0.8-160000.3.1
python313-avahi-0.8-160000.3.1
typelib-1_0-Avahi-0_6-0.8-160000.3.1
Ссылки
- SUSE Security Ratings
- SUSE Bug 1233421
- SUSE CVE CVE-2024-52615 page
Описание
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Затронутые продукты
openSUSE Leap 16.0:avahi-0.8-160000.3.1
openSUSE Leap 16.0:avahi-autoipd-0.8-160000.3.1
openSUSE Leap 16.0:avahi-compat-howl-devel-0.8-160000.3.1
openSUSE Leap 16.0:avahi-compat-mDNSResponder-devel-0.8-160000.3.1
Ссылки
- CVE-2024-52615
- SUSE Bug 1233421