<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/poky.git/meta/recipes-connectivity/avahi, branch scarthgap</title>
<subtitle>Mirror of git.yoctoproject.org/poky</subtitle>
<id>https://git.enea.com/cgit/linux/poky.git/atom?h=scarthgap</id>
<link rel='self' href='https://git.enea.com/cgit/linux/poky.git/atom?h=scarthgap'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/'/>
<updated>2026-02-27T17:45:06+00:00</updated>
<entry>
<title>avahi: patch CVE-2026-24401</title>
<updated>2026-02-27T17:45:06+00:00</updated>
<author>
<name>Ankur Tyagi</name>
<email>ankur.tyagi85@gmail.com</email>
</author>
<published>2026-01-25T09:46:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=34deee3e528805c79340860a42cbdb94af67d5c7'/>
<id>urn:sha1:34deee3e528805c79340860a42cbdb94af67d5c7</id>
<content type='text'>
Details https://nvd.nist.gov/vuln/detail/CVE-2026-24401

(From OE-Core rev: 030a3fff4b05b785f6ed1a97310b8386628adbf9)

Signed-off-by: Ankur Tyagi &lt;ankur.tyagi85@gmail.com&gt;
Signed-off-by: Mathieu Dubois-Briand &lt;mathieu.dubois-briand@bootlin.com&gt;
Signed-off-by: Ross Burton &lt;ross.burton@arm.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
(cherry picked from commit 183d0ee54f1c194e245a7bbf243c19b3c2acf4f5)
Signed-off-by: Yoann Congal &lt;yoann.congal@smile.fr&gt;
Signed-off-by: Paul Barker &lt;paul@pbarker.dev&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>avahi: patch CVE-2025-68471</title>
<updated>2026-02-27T17:45:06+00:00</updated>
<author>
<name>Amaury Couderc</name>
<email>amaury.couderc@est.tech</email>
</author>
<published>2026-02-09T14:21:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=49dc4dd983e7a9b502fbee2cf9f2aad5aa4e211f'/>
<id>urn:sha1:49dc4dd983e7a9b502fbee2cf9f2aad5aa4e211f</id>
<content type='text'>
(From OE-Core rev: bfd12b872d922116c1a793cd9debb5ee773bfeaf)

Signed-off-by: Amaury Couderc &lt;amaury.couderc@est.tech&gt;
Signed-off-by: Mathieu Dubois-Briand &lt;mathieu.dubois-briand@bootlin.com&gt;
Signed-off-by: Ross Burton &lt;ross.burton@arm.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
(cherry picked from commit 5ec4156330c765bc52dbce28dbba6def9868d30f)
Signed-off-by: Yoann Congal &lt;yoann.congal@smile.fr&gt;
Signed-off-by: Paul Barker &lt;paul@pbarker.dev&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>avahi: patch CVE-2025-68468</title>
<updated>2026-02-27T17:45:06+00:00</updated>
<author>
<name>Amaury Couderc</name>
<email>amaury.couderc@est.tech</email>
</author>
<published>2026-02-09T14:21:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=0d954471b5e161db24547eff3b503ceeebb29512'/>
<id>urn:sha1:0d954471b5e161db24547eff3b503ceeebb29512</id>
<content type='text'>
(From OE-Core rev: 1eebd6d5bd5d930aa8ec68f73789ff0bd742441c)

Signed-off-by: Amaury Couderc &lt;amaury.couderc@est.tech&gt;
Signed-off-by: Mathieu Dubois-Briand &lt;mathieu.dubois-briand@bootlin.com&gt;
Signed-off-by: Ross Burton &lt;ross.burton@arm.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
(cherry picked from commit 9f2ed8adc37a42b561b3c4853cf8106fba39889e)
Signed-off-by: Yoann Congal &lt;yoann.congal@smile.fr&gt;
Signed-off-by: Paul Barker &lt;paul@pbarker.dev&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>avahi: patch CVE-2025-68276</title>
<updated>2026-02-27T17:45:06+00:00</updated>
<author>
<name>Ankur Tyagi</name>
<email>ankur.tyagi85@gmail.com</email>
</author>
<published>2026-01-25T09:40:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=a57370d30cf961c4ad0158eef0d7990111eda07e'/>
<id>urn:sha1:a57370d30cf961c4ad0158eef0d7990111eda07e</id>
<content type='text'>
Backport the patch[1] from the PR[2] mentioned in the nvd[3].

[1] https://github.com/avahi/avahi/commit/2d48e42d44a183f26a4d12d1f5d41abb9b7c6355
[2] https://github.com/avahi/avahi/pull/806
[3] https://nvd.nist.gov/vuln/detail/CVE-2025-68276

Dropped CI changes from the original PR during backport.

(From OE-Core rev: 4da15f7fad8df7ba5fae29bc72156b189e993d58)

Signed-off-by: Ankur Tyagi &lt;ankur.tyagi85@gmail.com&gt;
Signed-off-by: Yoann Congal &lt;yoann.congal@smile.fr&gt;
Signed-off-by: Paul Barker &lt;paul@pbarker.dev&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>avahi: fix CVE-2024-52615</title>
<updated>2025-08-20T14:37:19+00:00</updated>
<author>
<name>Zhang Peng</name>
<email>peng.zhang1.cn@windriver.com</email>
</author>
<published>2025-07-31T06:06:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=0263c3dfa4fe1b26619f028a6a1c242e7e221dbf'/>
<id>urn:sha1:0263c3dfa4fe1b26619f028a6a1c242e7e221dbf</id>
<content type='text'>
CVE-2024-52615:
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area
DNS queries. This issue simplifies attacks where malicious DNS responses are injected.

Reference:
[https://nvd.nist.gov/vuln/detail/CVE-2024-52615]
[https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g]

Upstream patches:
[https://github.com/avahi/avahi/commit/4e2e1ea0908d7e6ad7f38ae04fdcdf2411f8b942]

(From OE-Core rev: ec22ec26b3f40ed5e0d84d60c29d8c315cf72e23)

Signed-off-by: Zhang Peng &lt;peng.zhang1.cn@windriver.com&gt;
Signed-off-by: Steve Sakoman &lt;steve@sakoman.com&gt;
</content>
</entry>
<entry>
<title>avahi: fix CVE-2024-52616</title>
<updated>2025-01-24T15:59:38+00:00</updated>
<author>
<name>Zhang Peng</name>
<email>peng.zhang1.cn@windriver.com</email>
</author>
<published>2025-01-16T13:51:38+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=0d1f714793cb73f3e4a95e67e2f7d5ebd98a3462'/>
<id>urn:sha1:0d1f714793cb73f3e4a95e67e2f7d5ebd98a3462</id>
<content type='text'>
CVE-2024-52616:
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs
randomly only once at startup, incrementing them sequentially after that. This
predictable behavior facilitates DNS spoofing attacks, allowing attackers to
guess transaction IDs.

Reference:
[https://nvd.nist.gov/vuln/detail/CVE-2024-52616]
[https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm]

Upstream patches:
[https://github.com/avahi/avahi/commit/f8710bdc8b29ee1176fe3bfaeabebbda1b7a79f7]

(From OE-Core rev: 28de3f131b17dc4165df927060ee51f0de3ada90)

Signed-off-by: Zhang Peng &lt;peng.zhang1.cn@windriver.com&gt;
Signed-off-by: Steve Sakoman &lt;steve@sakoman.com&gt;
</content>
</entry>
<entry>
<title>avahi: backport CVE-2023-1981 &amp; CVE's follow-up patches</title>
<updated>2023-12-21T10:38:30+00:00</updated>
<author>
<name>Vijay Anusuri</name>
<email>vanusuri@mvista.com</email>
</author>
<published>2023-12-12T09:05:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=198d891baa5dbeaca0e02e1904208d0edd30d495'/>
<id>urn:sha1:198d891baa5dbeaca0e02e1904208d0edd30d495</id>
<content type='text'>
import patches from ubuntu to fix
 CVE-2023-1981
 CVE-2023-38469-2
 CVE-2023-38470-2
 CVE-2023-38471-2

Upstream-Status: Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/avahi/tree/debian/patches?h=ubuntu/jammy-security
Upstream commit
https://github.com/lathiat/avahi/commit/a2696da2f2c50ac43b6c4903f72290d5c3fa9f6f
&amp;
https://github.com/lathiat/avahi/commit/c6cab87df290448a63323c8ca759baa516166237
&amp;
https://github.com/lathiat/avahi/commit/94cb6489114636940ac683515417990b55b5d66c
&amp;
https://github.com/lathiat/avahi/commit/b675f70739f404342f7f78635d6e2dcd85a13460]

Ref: https://git.openembedded.org/openembedded-core-contrib/commit/?h=stable/nanbield-nut&amp;id=a9203c46cd64c3ec5e5b00e381bbac85733f85df

(From OE-Core rev: 2b0d8a63a212897b33e85cc3694cd9a3d6e09ca8)

Signed-off-by: Vijay Anusuri &lt;vanusuri@mvista.com&gt;
Signed-off-by: Alexandre Belloni &lt;alexandre.belloni@bootlin.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>avahi: update URL for new project location</title>
<updated>2023-12-06T22:55:49+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@arm.com</email>
</author>
<published>2023-12-04T10:41:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=a9168feacb6d3d19a2658fe8c80cc25248f9a14e'/>
<id>urn:sha1:a9168feacb6d3d19a2658fe8c80cc25248f9a14e</id>
<content type='text'>
Avahi has moved to a new parent organisation on GitHub, so update the
URLs to match.

(From OE-Core rev: 02caef1567186f250e64ae3ef84fcff33d7323e4)

Signed-off-by: Ross Burton &lt;ross.burton@arm.com&gt;
Signed-off-by: Alexandre Belloni &lt;alexandre.belloni@bootlin.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>avahi: fix CVE-2023-38473</title>
<updated>2023-11-20T15:30:52+00:00</updated>
<author>
<name>Meenali Gupta</name>
<email>meenali.gupta@windriver.com</email>
</author>
<published>2023-11-16T11:19:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=34f496c2d47f1ab34a8330a0830726f24e7ba6cc'/>
<id>urn:sha1:34f496c2d47f1ab34a8330a0830726f24e7ba6cc</id>
<content type='text'>
A vulnerability was found in Avahi. A reachable assertion exists
in the avahi_alternative_host_name() function.

(From OE-Core rev: fbe506e7af1ce47f6d04c122cb77573e0527ab91)

Signed-off-by: Meenali Gupta &lt;meenali.gupta@windriver.com&gt;
Signed-off-by: Alexandre Belloni &lt;alexandre.belloni@bootlin.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>avahi: fix CVE-2023-38472</title>
<updated>2023-11-20T15:30:52+00:00</updated>
<author>
<name>Meenali Gupta</name>
<email>meenali.gupta@windriver.com</email>
</author>
<published>2023-11-16T11:44:50+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=9580629d5b34aa8a02f88582e15e179a900d9034'/>
<id>urn:sha1:9580629d5b34aa8a02f88582e15e179a900d9034</id>
<content type='text'>
A vulnerability was found in Avahi. A reachable assertion exists
in the avahi_rdata_parse() function.

(From OE-Core rev: 988d115ca18db1872d7a4dab39040029e5c61d6b)

Signed-off-by: Meenali Gupta &lt;meenali.gupta@windriver.com&gt;
Signed-off-by: Alexandre Belloni &lt;alexandre.belloni@bootlin.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
</feed>
