Skip to content

Commit 5dd7995

Browse files
[AutoPR- Security] Patch avahi for CVE-2025-68471, CVE-2025-68276, CVE-2025-68468 [MEDIUM] (#15502)
Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com>
1 parent 5e5723d commit 5dd7995

4 files changed

Lines changed: 133 additions & 2 deletions

File tree

SPECS/avahi/CVE-2025-68276.patch

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
From 9aa21a5ba089c46301a1c489f9643a5900e2e4cb Mon Sep 17 00:00:00 2001
2+
From: Evgeny Vereshchagin <evvers@ya.ru>
3+
Date: Wed, 17 Dec 2025 08:11:23 +0000
4+
Subject: [PATCH] core: refuse to create wide-area record browsers when
5+
wide-area is off
6+
7+
It fixes a bug where it was possible for unprivileged local users to
8+
crash avahi-daemon (with wide-area disabled) by creating record browsers
9+
with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus (either by calling
10+
the RecordBrowserNew method directly or by creating hostname/address/service
11+
resolvers/browsers that create those browsers internally themselves).
12+
13+
```
14+
$ gdbus call --system --dest org.freedesktop.Avahi --object-path / --method org.freedesktop.Avahi.Server.ResolveHostName -- -1 -1 yo.local -1 1
15+
Error: GDBus.Error:org.freedesktop.DBus.Error.NoReply: Message recipient disconnected from message bus without replying
16+
```
17+
```
18+
dbus-protocol.c: interface=org.freedesktop.Avahi.Server, path=/, member=ResolveHostName
19+
avahi-daemon: wide-area.c:725: avahi_wide_area_scan_cache: Assertion `e' failed.
20+
==307948==
21+
==307948== Process terminating with default action of signal 6 (SIGABRT)
22+
==307948== at 0x4B3630C: __pthread_kill_implementation (pthread_kill.c:44)
23+
==307948== by 0x4ADF921: raise (raise.c:26)
24+
==307948== by 0x4AC74AB: abort (abort.c:77)
25+
==307948== by 0x4AC741F: __assert_fail_base.cold (assert.c:118)
26+
==307948== by 0x48D8B85: avahi_wide_area_scan_cache (wide-area.c:725)
27+
==307948== by 0x48C8953: lookup_scan_cache (browse.c:351)
28+
==307948== by 0x48C8B1B: lookup_go (browse.c:386)
29+
==307948== by 0x48C9148: defer_callback (browse.c:516)
30+
==307948== by 0x48AEA0E: expiration_event (timeeventq.c:94)
31+
==307948== by 0x489D3AE: timeout_callback (simple-watch.c:447)
32+
==307948== by 0x489D787: avahi_simple_poll_dispatch (simple-watch.c:563)
33+
==307948== by 0x489D91E: avahi_simple_poll_iterate (simple-watch.c:605)
34+
==307948==
35+
```
36+
37+
wide-area has been disabled by default since
38+
9c4214146738146e454f098264690e8e884c39bd (v0.9-rc2).
39+
40+
https: //github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc
41+
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
42+
Upstream-reference: https://github.com/avahi/avahi/commit/0c013e2e819be3bda74cecf48b5f64956cf8a760.patch
43+
---
44+
avahi-core/browse.c | 5 +++++
45+
1 file changed, 5 insertions(+)
46+
47+
diff --git a/avahi-core/browse.c b/avahi-core/browse.c
48+
index 1cf0ee3..57435fc 100644
49+
--- a/avahi-core/browse.c
50+
+++ b/avahi-core/browse.c
51+
@@ -543,6 +543,11 @@ AvahiSRecordBrowser *avahi_s_record_browser_prepare(
52+
AVAHI_CHECK_VALIDITY_RETURN_NULL(server, AVAHI_FLAGS_VALID(flags, AVAHI_LOOKUP_USE_WIDE_AREA|AVAHI_LOOKUP_USE_MULTICAST), AVAHI_ERR_INVALID_FLAGS);
53+
AVAHI_CHECK_VALIDITY_RETURN_NULL(server, !(flags & AVAHI_LOOKUP_USE_WIDE_AREA) || !(flags & AVAHI_LOOKUP_USE_MULTICAST), AVAHI_ERR_INVALID_FLAGS);
54+
55+
+ if ((flags & AVAHI_LOOKUP_USE_WIDE_AREA) && !server->wide_area_lookup_engine) {
56+
+ avahi_server_set_errno(server, AVAHI_ERR_NOT_SUPPORTED);
57+
+ return NULL;
58+
+ }
59+
+
60+
if (!(b = avahi_new(AvahiSRecordBrowser, 1))) {
61+
avahi_server_set_errno(server, AVAHI_ERR_NO_MEMORY);
62+
return NULL;
63+
--
64+
2.45.4
65+

SPECS/avahi/CVE-2025-68468.patch

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
From 2aad32193f8b4391309498c884d6f906eb962c01 Mon Sep 17 00:00:00 2001
2+
From: Hugo Muis <198191869+friendlyhugo@users.noreply.github.com>
3+
Date: Sun, 2 Mar 2025 18:06:24 +0100
4+
Subject: [PATCH] core: fix DoS bug by removing incorrect assertion
5+
6+
Closes https://github.com/avahi/avahi/issues/683
7+
8+
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
9+
Upstream-reference: https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a.patch
10+
---
11+
avahi-core/browse.c | 1 -
12+
1 file changed, 1 deletion(-)
13+
14+
diff --git a/avahi-core/browse.c b/avahi-core/browse.c
15+
index e8a915e..2966f95 100644
16+
--- a/avahi-core/browse.c
17+
+++ b/avahi-core/browse.c
18+
@@ -295,7 +295,6 @@ static void lookup_multicast_callback(
19+
lookup_drop_cname(l, interface, protocol, 0, r);
20+
else {
21+
/* It's a normal record, so let's call the user callback */
22+
- assert(avahi_key_equal(b->key, l->key));
23+
24+
b->callback(b, interface, protocol, event, r, flags, b->userdata);
25+
}
26+
--
27+
2.45.4
28+

SPECS/avahi/CVE-2025-68471.patch

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
From 3c1445d537218a0678927dfbca54178b13062080 Mon Sep 17 00:00:00 2001
2+
From: Hugo Muis <198191869+friendlyhugo@users.noreply.github.com>
3+
Date: Sun, 2 Mar 2025 18:06:24 +0100
4+
Subject: [PATCH] core: fix DoS bug by changing assert to return
5+
6+
Closes https://github.com/avahi/avahi/issues/678
7+
8+
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
9+
Upstream-reference: https://github.com/avahi/avahi/pull/682/commits/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1.patch
10+
---
11+
avahi-core/browse.c | 5 ++++-
12+
1 file changed, 4 insertions(+), 1 deletion(-)
13+
14+
diff --git a/avahi-core/browse.c b/avahi-core/browse.c
15+
index 2966f95..1cf0ee3 100644
16+
--- a/avahi-core/browse.c
17+
+++ b/avahi-core/browse.c
18+
@@ -319,7 +319,10 @@ static int lookup_start(AvahiSRBLookup *l) {
19+
assert(l);
20+
21+
assert(!(l->flags & AVAHI_LOOKUP_USE_WIDE_AREA) != !(l->flags & AVAHI_LOOKUP_USE_MULTICAST));
22+
- assert(!l->wide_area && !l->multicast);
23+
+ if (l->wide_area || l->multicast) {
24+
+ /* Avoid starting a duplicate lookup */
25+
+ return 0;
26+
+ }
27+
28+
if (l->flags & AVAHI_LOOKUP_USE_WIDE_AREA) {
29+
30+
--
31+
2.45.4
32+

SPECS/avahi/avahi.spec

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Summary: Local network service discovery
44
Name: avahi
55
Version: 0.8
6-
Release: 5%{?dist}
6+
Release: 6%{?dist}
77
License: LGPLv2+
88
Vendor: Microsoft Corporation
99
Distribution: Azure Linux
@@ -19,6 +19,9 @@ Patch6: CVE-2023-38473.patch
1919
Patch7: CVE-2023-38470.patch
2020
Patch8: CVE-2023-38471.patch
2121
Patch9: CVE-2024-52616.patch
22+
Patch10: CVE-2025-68276.patch
23+
Patch11: CVE-2025-68468.patch
24+
Patch12: CVE-2025-68471.patch
2225
BuildRequires: automake
2326
BuildRequires: dbus-devel >= 0.90
2427
BuildRequires: dbus-glib-devel >= 0.70
@@ -426,7 +429,10 @@ exit 0
426429
%endif
427430

428431
%changelog
429-
* Thu Feb 13 2024 Kanishk Bansal <kanbansal@microsoft.com> - 0.8-5
432+
* Wed Jan 14 2026 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 0.8-6
433+
- Patch for CVE-2025-68471, CVE-2025-68276, CVE-2025-68468
434+
435+
* Thu Feb 13 2025 Kanishk Bansal <kanbansal@microsoft.com> - 0.8-5
430436
- Fix CVE-2024-52616 with an upstream patch
431437

432438
* Mon Dec 02 2024 Kanishk Bansal <kanbansal@microsoft.com> - 0.8-4

0 commit comments

Comments
 (0)