Source: avahi
Version: 0.8-13
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 0.8-10

Hi,

The following vulnerability was published for avahi.

Filling to the BTS to get a cross reference in the tracker.


CVE-2024-52616[0]:
| A flaw was found in the Avahi-daemon, where it initializes DNS
| transaction IDs randomly only once at startup, incrementing them
| sequentially after that. This predictable behavior facilitates DNS
| spoofing attacks, allowing attackers to guess transaction IDs.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-52616
    https://www.cve.org/CVERecord?id=CVE-2024-52616
[1] https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm

Regards,
Salvatore

_______________________________________________
Pkg-utopia-maintainers mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-utopia-maintainers

Reply via email to