SUSE: 2024:4282-1 moderate: avahi Security Advisory Updates
Summary
## This update for avahi fixes the following issues: * CVE-2024-52616: sequential increment of DNS transaction IDs allows DNS spoofing. (bsc#1233420) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4282=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libavahi-glib1-debuginfo-0.6.32-32.30.1 * libavahi-glib1-debuginfo-32bit-0.6.32-32.30.1 * libavahi-common3-debuginfo-0.6.32-32.30.1 * libavahi-client3-debuginfo-32bit-0.6.32-32.30.1 * libdns_sd-debuginfo-32bit-0.6.32-32.30.1 * libavahi-common3-0.6.32-32.30.1 * avahi-debuginfo-32bit-0.6.32-32.30.1 * libavahi-client3-0.6.32-32.30.1 * libavahi-core7-debugi...
Read the Full AdvisoryReferences
* bsc#1233420
Cross-
* CVE-2024-52616
CVSS scores:
* CVE-2024-52616 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves one vulnerability can now be installed.
##
* https://www.suse.com/security/cve/CVE-2024-52616.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233420