A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Red Hat Enterprise Linux 10 | RedHat | avahi-0:0.9~rc2-1.el10_0.1 | * |
| Red Hat Enterprise Linux 9 | RedHat | avahi-0:0.8-22.el9_6.1 | * |
| Red Hat Enterprise Linux 9 | RedHat | avahi-0:0.8-22.el9_6.1 | * |
| Avahi | Ubuntu | focal | * |
| Avahi | Ubuntu | oracular | * |
| Avahi | Ubuntu | plucky | * |
| Avahi | Ubuntu | trusty/esm | * |