vulnerability

Rocky Linux: CVE-2024-52615: avahi (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Oct 4, 2025
Added
Feb 5, 2026
Modified
Feb 9, 2026

Description

A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.

Solutions

rocky-upgrade-avahirocky-upgrade-avahi-autoipdrocky-upgrade-avahi-autoipd-debuginforocky-upgrade-avahi-compat-howlrocky-upgrade-avahi-compat-howl-debuginforocky-upgrade-avahi-compat-howl-develrocky-upgrade-avahi-compat-libdns_sdrocky-upgrade-avahi-compat-libdns_sd-debuginforocky-upgrade-avahi-compat-libdns_sd-develrocky-upgrade-avahi-debuginforocky-upgrade-avahi-debugsourcerocky-upgrade-avahi-develrocky-upgrade-avahi-glibrocky-upgrade-avahi-glib-debuginforocky-upgrade-avahi-glib-develrocky-upgrade-avahi-gobjectrocky-upgrade-avahi-gobject-debuginforocky-upgrade-avahi-gobject-develrocky-upgrade-avahi-libsrocky-upgrade-avahi-libs-debuginforocky-upgrade-avahi-toolsrocky-upgrade-avahi-tools-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.