Home
MEDIUM: 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NDefault status
unaffected
Any version before 0.9
affected
Default status
affected
0:0.8-22.el9_6 (rpm) before *
unaffected
Default status
affected
0:0.8-22.el9_6 (rpm) before *
unaffected
Default status
unknown
Default status
affected
Default status
affected
Description
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Problem types
Product status
Any version before 0.9
0:0.8-22.el9_6 (rpm) before *
0:0.8-22.el9_6 (rpm) before *
Timeline
| 2024-11-15: | Reported to Red Hat. |
| 2024-11-15: | Made public. |
References
access.redhat.com/errata/RHSA-2025:7437 (RHSA-2025:7437)
access.redhat.com/security/cve/CVE-2024-52616
bugzilla.redhat.com/show_bug.cgi?id=2326429 (RHBZ#2326429)