Untriaged
Permalink
CVE-2024-52616
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): NONE
Avahi: avahi wide-area dns predictable transaction ids
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
References
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHSA-2025:7437 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- RHSA-2025:7437 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- RHSA-2025:7437 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
- RHSA-2025:7437 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-52616 x_refsource_REDHAT vdb-entry
- RHBZ#2326429 issue-tracking x_refsource_REDHAT
Affected products
avahi
- <0.9
- *
rhcos
Matching in nixpkgs
pkgs.guile-avahi
Bindings to Avahi for GNU Guile
-
nixos-unstable -
- nixpkgs-unstable 0.4.1
pkgs.avahi-compat
mDNS/DNS-SD implementation
-
nixos-unstable -
- nixpkgs-unstable 0.8
pkgs.haskellPackages.avahi
Minimal DBus bindings for Avahi daemon (http://avahi.org)
-
nixos-unstable -
- nixpkgs-unstable 0.2.0
pkgs.python312Packages.avahi
mDNS/DNS-SD implementation
-
nixos-unstable -
- nixpkgs-unstable 0.8
pkgs.python313Packages.avahi
mDNS/DNS-SD implementation
-
nixos-unstable -
- nixpkgs-unstable 0.8
Package maintainers
-
@lovek323 Jason O'Conal <jason@oconal.id.au>
-
@globin Robin Gloster <mail@glob.in>
-
@foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one>