Reference: https://www.openwall.com/lists/oss-security/2025/12/19/1 Candidate fix: https://github.com/avahi/avahi/pull/808
Source RPM: (none) => avahi-0.8-16.mga10.src.rpm, avahi-0.8-10.2.mga9.src.rpmWhiteboard: (none) => MGA9TOOCVE: (none) => CVE-2025-59529Status comment: (none) => Candidate fix available
Thank you for the fix URL. Assigning globally as various packagers touch this.
Assignee: bugsquad => pkg-bugs
Adding the flag: affects_mga9 + to all bugs with MGA9TOO on the whiteboard, without removing MGA9TOO (for now).
Flags: (none) => affects_mga9+
CVE: CVE-2025-59529 => CVE-2025-59529, CVE-2025-68276, CVE-2025-68468, CVE-2025-68471Summary: avahi new security issue CVE-2025-59529 => avahi new security issues CVE-2025-59529, CVE-2025-68276, CVE-2025-68468 and CVE-2025-68471Status comment: Candidate fix available => Candidate fix available, fixes available from upstream
openSUSE has issued an advisory on January 16: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DR2CTF5XR6GVX3JYIAAO3ULJNUZDGBVS/
avahi-0.8-17.mga10 fixes CVE-2025-68276, CVE-2025-68468 and CVE-2025-68471 but not CVE-2025-59529.
Source RPM: avahi-0.8-16.mga10.src.rpm, avahi-0.8-10.2.mga9.src.rpm => avahi-0.8-17.mga10.src.rpm, avahi-0.8-10.2.mga9.src.rpm
Ubuntu has issued an advisory on January 19: https://ubuntu.com/security/notices/USN-7967-1
Blocks: (none) => 35044
CVE-2025-59529 in bug 35044
Flags: affects_mga9+ => (none)Summary: avahi new security issues CVE-2025-59529, CVE-2025-68276, CVE-2025-68468 and CVE-2025-68471 => avahi new security issues CVE-2025-68276, CVE-2025-68468 and CVE-2025-68471CVE: CVE-2025-59529, CVE-2025-68276, CVE-2025-68468, CVE-2025-68471 => CVE-2025-68276, CVE-2025-68468, CVE-2025-68471Source RPM: avahi-0.8-17.mga10.src.rpm, avahi-0.8-10.2.mga9.src.rpm => avahi-0.8-10.2.mga9.src.rpmStatus comment: Candidate fix available, fixes available from upstream => fixes available from upstreamVersion: Cauldron => 9Whiteboard: MGA9TOO => (none)
Suggested advisory: ======================== The updated packages fix security vulnerabilities: Avahi has a reachable assertion in avahi_wide_area_scan_cache. (CVE-2025-68276) Avahi has a reachable assertion in lookup_multicast_callback. (CVE-2025-68468) Avahi has a reachable assertion in lookup_start. (CVE-2025-68471) References: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DR2CTF5XR6GVX3JYIAAO3ULJNUZDGBVS/ https://ubuntu.com/security/notices/USN-7967-1 ======================== Updated packages in core/updates_testing: ======================== avahi-0.8-10.3.mga9 avahi-dnsconfd-0.8-10.3.mga9 avahi-sharp-0.8-10.3.mga9 avahi-sharp-doc-0.8-10.3.mga9 avahi-x11-0.8-10.3.mga9 lib(64)avahi-client-devel-0.8-10.3.mga9 lib(64)avahi-client3-0.8-10.3.mga9 lib(64)avahi-common-devel-0.8-10.3.mga9 lib(64)avahi-common3-0.8-10.3.mga9 lib(64)avahi-compat-howl-devel-0.8-10.3.mga9 lib(64)avahi-compat-howl0-0.8-10.3.mga9 lib(64)avahi-compat-libdns_sd-devel-0.8-10.3.mga9 lib(64)avahi-compat-libdns_sd1-0.8-10.3.mga9 lib(64)avahi-core-devel-0.8-10.3.mga9 lib(64)avahi-core7-0.8-10.3.mga9 lib(64)avahi-gir0.6-0.8-10.3.mga9 lib(64)avahi-glib-devel-0.8-10.3.mga9 lib(64)avahi-glib1-0.8-10.3.mga9 lib(64)avahi-gobject-devel-0.8-10.3.mga9 lib(64)avahi-gobject0-0.8-10.3.mga9 lib(64)avahi-libevent-devel-0.8-10.3.mga9 lib(64)avahi-libevent1-0.8-10.3.mga9 lib(64)avahi-qt5-devel-0.8-10.3.mga9 lib(64)avahi-qt5_1-0.8-10.3.mga9 lib(64)avahi-ui-gtk3-devel-0.8-10.3.mga9 lib(64)avahi-ui-gtk3_0-0.8-10.3.mga9 lib(64)avahicore-gir0.6-0.8-10.3.mga9 from SRPM: avahi-0.8-10.3.mga9.src.rpm
Status: NEW => ASSIGNEDAssignee: pkg-bugs => qa-bugsStatus comment: fixes available from upstream => (none)
MGA9-server 64 Plasma Wayland on Compaq H000SB No installation issues. Ref bug 32363 Comment 6 for testing. Used the commands avahi-discover-standalone and avahi-browse --all -t Both providing sensible output. OK for me.
CC: (none) => herman.viaene
Whiteboard: (none) => MGA9-64-OKFlags: (none) => test_passed_mga9_64+
Keywords: (none) => advisory
Validating.
Keywords: (none) => validated_updateCC: (none) => andrewsfarm, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2026-0016.html
Resolution: (none) => FIXEDStatus: ASSIGNED => RESOLVED