{"affected":[{"ecosystem_specific":{"binaries":[{"avahi":"0.8-6.1","libavahi-client3":"0.8-6.1","libavahi-common3":"0.8-6.1","libavahi-core7":"0.8-6.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"avahi","purl":"pkg:rpm/suse/avahi&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.8-6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for avahi fixes the following issues:\n\n- CVE-2024-52616: Properly randomize query id of DNS packets (bsc#1233420).\n\nBug fixes:\n\n- No longer supply bogus services to callbacks (bsc#1226586).\n- Tag hardening patches as PATCH-FEATURE-OPENSUSE\n- Remove dependency on /usr/bin/python3 using %python3_fix_shebang macro (bsc#1212476).\n","id":"SUSE-SU-2025:20103-1","modified":"2025-02-03T09:17:27Z","published":"2025-02-03T09:17:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520103-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233420"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-52616"}],"related":["CVE-2024-52616"],"summary":"Security update for avahi","upstream":["CVE-2024-52616"]}