Security update for avahi
| Announcement ID: | SUSE-SU-2026:20525-1 |
|---|---|
| Release Date: | 2026-02-26T10:54:05Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves four vulnerabilities can now be installed.
Description:
This update for avahi fixes the following issues:
- CVE-2024-52615: Resolve fixed source ports for wide-area DNS queries cause DNS responses be injected. (bsc#1233421)
- CVE-2025-68468: Fixed DoS bug by removing incorrect assertion. (bsc#1256499)
- CVE-2025-68471: Fixed DoS bug by changing assert to return. (bsc#1256500)
- CVE-2025-68276: Refuse to create wide-area record browsers when wide-area is off. (bsc#1256498)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-595=1
Package List:
-
SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
- libavahi-common3-debuginfo-0.8-7.1
- libavahi-client3-debuginfo-0.8-7.1
- avahi-0.8-7.1
- avahi-debuginfo-0.8-7.1
- avahi-debugsource-0.8-7.1
- libavahi-core7-0.8-7.1
- libavahi-common3-0.8-7.1
- libavahi-core7-debuginfo-0.8-7.1
- libavahi-client3-0.8-7.1
References:
- https://www.suse.com/security/cve/CVE-2024-52615.html
- https://www.suse.com/security/cve/CVE-2025-68276.html
- https://www.suse.com/security/cve/CVE-2025-68468.html
- https://www.suse.com/security/cve/CVE-2025-68471.html
- https://bugzilla.suse.com/show_bug.cgi?id=1233421
- https://bugzilla.suse.com/show_bug.cgi?id=1256498
- https://bugzilla.suse.com/show_bug.cgi?id=1256499
- https://bugzilla.suse.com/show_bug.cgi?id=1256500