{"id":"CVE-2024-52615","details":"A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.","modified":"2026-04-10T05:12:21.839625Z","published":"2024-11-21T21:15:23Z","related":["ALSA-2025:16441","MGASA-2025-0007","SUSE-SU-2025:03266-1","SUSE-SU-2025:03331-1","SUSE-SU-2025:03332-1","SUSE-SU-2025:03333-1","SUSE-SU-2026:20027-1","SUSE-SU-2026:20070-1","SUSE-SU-2026:20491-1","SUSE-SU-2026:20525-1","openSUSE-SU-2025:15575-1","openSUSE-SU-2026:20013-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:11402"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:16441"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326418"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-52615"}],"schema_version":"1.7.5"}