Source: avahi Version: 0.8-10 Severity: important Tags: security upstream Forwarded: https://github.com/avahi/avahi/issues/683 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for avahi. CVE-2025-68468[0]: | Avahi is a system which facilitates service discovery on a local | network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, | avahi-daemon can be crashed by sending unsolicited announcements | containing CNAME resource records pointing it to resource records | with short TTLs. As soon as they expire avahi-daemon crashes. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-68468 https://www.cve.org/CVERecord?id=CVE-2025-68468 [1] https://github.com/avahi/avahi/issues/683 [2] https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 [3] https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a Regards, Salvatore

