CVE-2025-59529

Name
CVE-2025-59529
Description
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions up to and including 0.9-rc2, the simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local DoS. Although `CLIENTS_MAX` is defined, `server_work()` unconditionally `accept()`s and `client_new()` always appends the new client and increments `n_clients`. There is no check against the limit. When client cannot be accepted as a result of maximal socket number of avahi-daemon, it logs unconditionally error per each connection. Unprivileged local users can exhaust daemon memory and file descriptors, causing a denial of service system-wide for mDNS/DNS-SD. Exhausting local file descriptors causes increased system load caused by logging errors of each of request. Overloading prevents glibc calls using nss-mdns plugins to resolve `*.local.` names and link-local addresses. As of time of publication, no known patched versions are available, but a candidate fix is available in pull request 808, and some workarounds are available. Simple clients are offered for nss-mdns package functionality. It is not possible to disable the unix socket `/run/avahi-daemon/socket`, but resolution requests received via DBus are not affected directly. Tools avahi-resolve, avahi-resolve-address and avahi-resolve-host-name are not affected, they use DBus interface. It is possible to change permissions of unix socket after avahi-daemon is started. But avahi-daemon does not provide any configuration for it. Additional access restrictions like SELinux can also prevent unwanted tools to access the socket and keep resolution working for trusted users.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/avahi/avahi/pull/808
CONFIRM https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q
MISC https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/12/19/1

Match rules

CPE URI Source package Min version Max version
avahi >= 0 <= 0.9-rc2
cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:* avahi >= None < 0.9

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
avahi edge-main 0.8-r23 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r22 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r21 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r20 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r19 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r18 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r17 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r16 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r15 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r14 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r13 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r12 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r11 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r10 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r9 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r8 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r6 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r5 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r4 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.8-r3 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi edge-main 0.7-r2 None possibly vulnerable
avahi 3.23-main 0.8-r23 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.22-main 0.8-r21 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.22-main 0.8-r20 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.22-main 0.8-r16 None possibly vulnerable
avahi 3.22-main 0.8-r15 None possibly vulnerable
avahi 3.22-main 0.8-r14 None possibly vulnerable
avahi 3.22-main 0.8-r5 None possibly vulnerable
avahi 3.22-main 0.8-r4 None possibly vulnerable
avahi 3.22-main 0.7-r2 None possibly vulnerable
avahi 3.21-main 0.8-r19 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.21-main 0.8-r16 None possibly vulnerable
avahi 3.21-main 0.8-r15 None possibly vulnerable
avahi 3.21-main 0.8-r14 None possibly vulnerable
avahi 3.21-main 0.8-r5 None possibly vulnerable
avahi 3.21-main 0.8-r4 None possibly vulnerable
avahi 3.21-main 0.7-r2 None possibly vulnerable
avahi 3.20-main 0.8-r17 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.20-main 0.8-r16 None possibly vulnerable
avahi 3.20-main 0.8-r15 None possibly vulnerable
avahi 3.20-main 0.8-r14 None possibly vulnerable
avahi 3.20-main 0.8-r5 None possibly vulnerable
avahi 3.20-main 0.8-r4 None possibly vulnerable
avahi 3.20-main 0.7-r2 None possibly vulnerable
avahi 3.19-main 0.8-r16 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.19-main 0.8-r15 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.19-main 0.8-r14 None possibly vulnerable
avahi 3.19-main 0.8-r13 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
avahi 3.19-main 0.8-r5 None possibly vulnerable
avahi 3.19-main 0.8-r4 None possibly vulnerable
avahi 3.19-main 0.7-r2 None possibly vulnerable