Bug ID 1233421
Summary VUL-0: CVE-2024-52615: avahi: Avahi Wide-Area DNS Uses Constant Source Port
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/428646/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee gnome-bugs@suse.de
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC stoyan.manolov@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

This vulnerability exposes Avahi-daemon to potential DNS spoofing attacks by
using a fixed source port for queries. However, the impact is limited because
it only affects wide-area DNS and can be mitigated by forwarding queries to
local DNS resolvers (e.g., systemd-resolved), which provide better
randomization. The impact is primarily on systems actively using wide-area DNS,
with .local mDNS being unaffected.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-52615
https://bugzilla.redhat.com/show_bug.cgi?id=2326418


You are receiving this mail because: