Home

Description

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

PUBLISHED Reserved 2024-11-15 | Published 2024-11-21 | Updated 2025-11-20 | Assigner redhat




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Small Space of Random Values

Product status

Default status
unaffected

Any version before 0.9
affected

Default status
affected

0:0.8-22.el9_6 (rpm) before *
unaffected

Default status
affected

0:0.8-22.el9_6 (rpm) before *
unaffected

Default status
unknown

Default status
affected

Default status
affected

Timeline

2024-11-15:Reported to Red Hat.
2024-11-15:Made public.

References

access.redhat.com/errata/RHSA-2025:7437 (RHSA-2025:7437) vendor-advisory

access.redhat.com/security/cve/CVE-2024-52616 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2326429 (RHBZ#2326429) issue-tracking

cve.org (CVE-2024-52616)

nvd.nist.gov (CVE-2024-52616)

Download JSON