poky/meta/recipes-connectivity/avahi
Zhang Peng 744e331d5b avahi: fix CVE-2024-52616
CVE-2024-52616:
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs
randomly only once at startup, incrementing them sequentially after that. This
predictable behavior facilitates DNS spoofing attacks, allowing attackers to
guess transaction IDs.

Reference:
[https://nvd.nist.gov/vuln/detail/CVE-2024-52616]
[https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm]

Upstream patches:
[f8710bdc8b]

(From OE-Core rev: 7708d0c346b23ab3e687e2a2ca464d77d55cebd7)

Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
..
files avahi: fix CVE-2024-52616 2025-01-24 07:49:28 -08:00
avahi_0.8.bb avahi: fix CVE-2024-52616 2025-01-24 07:49:28 -08:00