DEBIAN-CVE-2024-52615

Source
https://security-tracker.debian.org/tracker/CVE-2024-52615
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-52615.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-52615
Upstream
Published
2024-11-21T21:15:23.807Z
Modified
2025-11-14T04:07:58.731435Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.

References

Affected packages

Debian:11 / avahi

Package

Name
avahi
Purl
pkg:deb/debian/avahi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8-5
0.8-5+deb11u1
0.8-5+deb11u2
0.8-5+deb11u3
0.8-6
0.8-7
0.8-8
0.8-9
0.8-10
0.8-11
0.8-12
0.8-13
0.8-14
0.8-15
0.8-16
0.8-17

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / avahi

Package

Name
avahi
Purl
pkg:deb/debian/avahi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8-10
0.8-10+deb12u1
0.8-11
0.8-12
0.8-13
0.8-14
0.8-15
0.8-16
0.8-17

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / avahi

Package

Name
avahi
Purl
pkg:deb/debian/avahi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8-16
0.8-17

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / avahi

Package

Name
avahi
Purl
pkg:deb/debian/avahi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8-16
0.8-17

Ecosystem specific

{
    "urgency": "not yet assigned"
}