vulnerability
Red Hat: CVE-2024-52615: avahi: Avahi Wide-Area DNS Uses Constant Source Port (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Nov 21, 2024 | Jul 9, 2025 | Jan 28, 2026 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Nov 21, 2024
Added
Jul 9, 2025
Modified
Jan 28, 2026
Description
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-avahiredhat-upgrade-avahi-autoipdredhat-upgrade-avahi-autoipd-debuginforedhat-upgrade-avahi-compat-howlredhat-upgrade-avahi-compat-howl-debuginforedhat-upgrade-avahi-compat-howl-develredhat-upgrade-avahi-compat-libdns_sdredhat-upgrade-avahi-compat-libdns_sd-debuginforedhat-upgrade-avahi-compat-libdns_sd-develredhat-upgrade-avahi-debuginforedhat-upgrade-avahi-debugsourceredhat-upgrade-avahi-develredhat-upgrade-avahi-dnsconfd-debuginforedhat-upgrade-avahi-glibredhat-upgrade-avahi-glib-debuginforedhat-upgrade-avahi-glib-develredhat-upgrade-avahi-gobjectredhat-upgrade-avahi-gobject-debuginforedhat-upgrade-avahi-gobject-develredhat-upgrade-avahi-libsredhat-upgrade-avahi-libs-debuginforedhat-upgrade-avahi-toolsredhat-upgrade-avahi-tools-debuginforedhat-upgrade-avahi-ui-debuginforedhat-upgrade-avahi-ui-gtk3-debuginforedhat-upgrade-avahi-ui-tools-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.