Source: avahi Version: 0.8-10 Severity: important Tags: security upstream Forwarded: https://github.com/avahi/avahi/pull/806 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for avahi. CVE-2025-68276[0]: | Avahi is a system which facilitates service discovery on a local | network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, | an unprivileged local users can crash avahi-daemon (with wide-area | disabled) by creating record browsers with the | AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by | either calling the RecordBrowserNew method directly or creating | hostname/address/service resolvers/browsers that create those | browsers internally themselves. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-68276 https://www.cve.org/CVERecord?id=CVE-2025-68276 [1] https://github.com/avahi/avahi/pull/806 [2] https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc [3] https://github.com/avahi/avahi/commit/2d48e42d44a183f26a4d12d1f5d41abb9b7c6355 Regards, Salvatore

