SUSE-SU-2025:03332-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-202503332-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:03332-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:03332-1
Upstream
Related
Published
2025-09-24T06:54:39Z
Modified
2025-09-24T18:46:58.737559Z
Summary
Security update for avahi
Details

This update for avahi fixes the following issues:

  • CVE-2024-52615: wide-area DNS uses constant source port for queries and can expose the Avahi-daemon to DNS spoofing attacks (bsc#1233421).
References

Affected packages

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / avahi

Package

Name
avahi
Purl
pkg:rpm/suse/avahi&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.32-32.33.1

Ecosystem specific

{
    "binaries": [
        {
            "libavahi-core7": "0.6.32-32.33.1",
            "libavahi-common3": "0.6.32-32.33.1",
            "libavahi-client3-32bit": "0.6.32-32.33.1",
            "avahi-utils": "0.6.32-32.33.1",
            "libavahi-devel": "0.6.32-32.33.1",
            "avahi": "0.6.32-32.33.1",
            "libavahi-client3": "0.6.32-32.33.1",
            "libavahi-common3-32bit": "0.6.32-32.33.1",
            "libdns_sd": "0.6.32-32.33.1",
            "libdns_sd-32bit": "0.6.32-32.33.1",
            "avahi-compat-mDNSResponder-devel": "0.6.32-32.33.1",
            "avahi-compat-howl-devel": "0.6.32-32.33.1",
            "avahi-lang": "0.6.32-32.33.1"
        }
    ]
}