vulnerability
Amazon Linux AMI 2: CVE-2024-52615: Security patch for avahi (ALAS-2024-2704)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Nov 21, 2024 | Dec 20, 2024 | Jan 28, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Nov 21, 2024
Added
Dec 20, 2024
Modified
Jan 28, 2025
Description
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Solutions
amazon-linux-ami-2-upgrade-avahiamazon-linux-ami-2-upgrade-avahi-autoipdamazon-linux-ami-2-upgrade-avahi-compat-howlamazon-linux-ami-2-upgrade-avahi-compat-howl-develamazon-linux-ami-2-upgrade-avahi-compat-libdns_sdamazon-linux-ami-2-upgrade-avahi-compat-libdns_sd-develamazon-linux-ami-2-upgrade-avahi-debuginfoamazon-linux-ami-2-upgrade-avahi-develamazon-linux-ami-2-upgrade-avahi-dnsconfdamazon-linux-ami-2-upgrade-avahi-glibamazon-linux-ami-2-upgrade-avahi-glib-develamazon-linux-ami-2-upgrade-avahi-gobjectamazon-linux-ami-2-upgrade-avahi-gobject-develamazon-linux-ami-2-upgrade-avahi-libsamazon-linux-ami-2-upgrade-avahi-qt3amazon-linux-ami-2-upgrade-avahi-qt3-develamazon-linux-ami-2-upgrade-avahi-qt4amazon-linux-ami-2-upgrade-avahi-qt4-develamazon-linux-ami-2-upgrade-avahi-toolsamazon-linux-ami-2-upgrade-avahi-uiamazon-linux-ami-2-upgrade-avahi-ui-develamazon-linux-ami-2-upgrade-avahi-ui-gtk3amazon-linux-ami-2-upgrade-avahi-ui-tools
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.