Source: avahi Version: 0.8-10 Severity: important Tags: security upstream Forwarded: https://github.com/avahi/avahi/issues/678 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for avahi. CVE-2025-68471[0]: | Avahi is a system which facilitates service discovery on a local | network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, | avahi-daemon can be crashed by sending 2 unsolicited announcements | with CNAME resource records 2 seconds apart. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-68471 https://www.cve.org/CVERecord?id=CVE-2025-68471 [1] https://github.com/avahi/avahi/issues/678 [2] https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg [3] https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 Regards, Salvatore

