{"id":"CVE-2024-52616","details":"A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.","modified":"2026-04-10T05:12:21.924224Z","published":"2024-11-21T21:15:24Z","related":["ALSA-2025:7437","MGASA-2025-0007","SUSE-SU-2024:4196-1","SUSE-SU-2024:4225-1","SUSE-SU-2024:4282-1","SUSE-SU-2024:4386-1","SUSE-SU-2025:20103-1","SUSE-SU-2025:20308-1","openSUSE-SU-2024:14538-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7437"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326429"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-52616"}],"schema_version":"1.7.5"}