Debian Avahi vulnerabilities

27 known vulnerabilities affecting debian/avahi.

Total CVEs
27
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM19LOW7

Vulnerabilities

Page 1 of 2
CVE-2026-24401MEDIUMCVSS 6.5fixed in avahi 0.8-18 (forky)2026
CVE-2026-24401 [MEDIUM] CVE-2026-24401: avahi - Avahi is a system which facilitates service discovery on a local network via the... Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.loca
debian
CVE-2026-34933MEDIUMCVSS 5.52026
CVE-2026-34933 [MEDIUM] CVE-2026-34933: avahi - Avahi is a system which facilitates service discovery on a local network via the... Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. Prior to version 0.9-rc4, any unprivileged local user can crash avahi-daemon by sending a single D-Bus method call with conflicting publish flags. This issue has been patched in version 0.9-rc4. Scope: local bookworm: open bullseye: open forky: open sid: open
debian
CVE-2025-68276MEDIUMCVSS 5.5fixed in avahi 0.8-18 (forky)2025
CVE-2025-68276 [MEDIUM] CVE-2025-68276: avahi - Avahi is a system which facilitates service discovery on a local network via the... Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling the RecordBrowserNew method directly or
debian
CVE-2025-59529MEDIUMCVSS 5.52025
CVE-2025-59529 [MEDIUM] CVE-2025-59529: avahi - Avahi is a system which facilitates service discovery on a local network via the... Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions up to and including 0.9-rc2, the simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local DoS. Although `CLIENTS_MAX` is defined, `server_work()` unconditionally `accept()`s and `client_
debian
CVE-2025-68468MEDIUMCVSS 6.5fixed in avahi 0.8-18 (forky)2025
CVE-2025-68468 [MEDIUM] CVE-2025-68468: avahi - Avahi is a system which facilitates service discovery on a local network via the... Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. As soon as they expire avahi-daemon crashes. Scope: local bookworm: open bullseye: open
debian
CVE-2025-68471MEDIUMCVSS 6.5fixed in avahi 0.8-18 (forky)2025
CVE-2025-68471 [MEDIUM] CVE-2025-68471: avahi - Avahi is a system which facilitates service discovery on a local network via the... Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 0.8-18) sid: resolved (fixed in 0.8-18) trixie: open
debian
CVE-2024-52615MEDIUMCVSS 5.32024
CVE-2024-52615 [MEDIUM] CVE-2024-52615: avahi - A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-ar... A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2024-52616MEDIUMCVSS 5.3fixed in avahi 0.8-18 (forky)2024
CVE-2024-52616 [MEDIUM] CVE-2024-52616: avahi - A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs r... A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 0.8-18) sid: resolved (fixed in 0.8-18) t
debian
CVE-2023-38470MEDIUMCVSS 6.2fixed in avahi 0.8-10+deb12u1 (bookworm)2023
CVE-2023-38470 [MEDIUM] CVE-2023-38470: avahi - A vulnerability was found in Avahi. A reachable assertion exists in the avahi_es... A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function. Scope: local bookworm: resolved (fixed in 0.8-10+deb12u1) bullseye: resolved (fixed in 0.8-5+deb11u3) forky: resolved (fixed in 0.8-14) sid: resolved (fixed in 0.8-14) trixie: resolved (fixed in 0.8-14)
debian
CVE-2023-1981MEDIUMCVSS 5.5fixed in avahi 0.8-10 (bookworm)2023
CVE-2023-1981 [MEDIUM] CVE-2023-1981: avahi - A vulnerability was found in the avahi library. This flaw allows an unprivileged... A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash. Scope: local bookworm: resolved (fixed in 0.8-10) bullseye: resolved (fixed in 0.8-5+deb11u3) forky: resolved (fixed in 0.8-10) sid: resolved (fixed in 0.8-10) trixie: resolved (fixed in 0.8-10)
debian
CVE-2023-38471MEDIUMCVSS 6.2fixed in avahi 0.8-10+deb12u1 (bookworm)2023
CVE-2023-38471 [MEDIUM] CVE-2023-38471: avahi - A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set... A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function. Scope: local bookworm: resolved (fixed in 0.8-10+deb12u1) bullseye: resolved (fixed in 0.8-5+deb11u3) forky: resolved (fixed in 0.8-14) sid: resolved (fixed in 0.8-14) trixie: resolved (fixed in 0.8-14)
debian
CVE-2023-38469MEDIUMCVSS 6.2fixed in avahi 0.8-10+deb12u1 (bookworm)2023
CVE-2023-38469 [MEDIUM] CVE-2023-38469: avahi - A vulnerability was found in Avahi, where a reachable assertion exists in avahi_... A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record. Scope: local bookworm: resolved (fixed in 0.8-10+deb12u1) bullseye: resolved (fixed in 0.8-5+deb11u3) forky: resolved (fixed in 0.8-14) sid: resolved (fixed in 0.8-14) trixie: resolved (fixed in 0.8-14)
debian
CVE-2023-38472MEDIUMCVSS 6.2fixed in avahi 0.8-10+deb12u1 (bookworm)2023
CVE-2023-38472 [MEDIUM] CVE-2023-38472: avahi - A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rd... A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function. Scope: local bookworm: resolved (fixed in 0.8-10+deb12u1) bullseye: resolved (fixed in 0.8-5+deb11u3) forky: resolved (fixed in 0.8-14) sid: resolved (fixed in 0.8-14) trixie: resolved (fixed in 0.8-14)
debian
CVE-2023-38473MEDIUMCVSS 6.2fixed in avahi 0.8-10+deb12u1 (bookworm)2023
CVE-2023-38473 [MEDIUM] CVE-2023-38473: avahi - A vulnerability was found in Avahi. A reachable assertion exists in the avahi_al... A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function. Scope: local bookworm: resolved (fixed in 0.8-10+deb12u1) bullseye: resolved (fixed in 0.8-5+deb11u3) forky: resolved (fixed in 0.8-14) sid: resolved (fixed in 0.8-14) trixie: resolved (fixed in 0.8-14)
debian
CVE-2021-26720HIGHCVSS 7.8fixed in avahi 0.8-4 (bookworm)2021
CVE-2021-26720 [HIGH] CVE-2021-26720: avahi - avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed ... avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstr
debian
CVE-2021-3502MEDIUMCVSS 5.5fixed in avahi 0.8-6 (bookworm)2021
CVE-2021-3502 [MEDIUM] CVE-2021-3502: avahi - A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_hos... A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability. Scope: local bookworm: resolved
debian
CVE-2021-3468MEDIUMCVSS 5.5fixed in avahi 0.8-7 (bookworm)2021
CVE-2021-3468 [MEDIUM] CVE-2021-3468: avahi - A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal th... A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive af
debian
CVE-2017-6519LOWCVSS 5.0fixed in avahi 0.7-5 (bookworm)2017
CVE-2017-6519 [MEDIUM] CVE-2017-6519: avahi - avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unic... avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may o
debian
CVE-2011-1002MEDIUMCVSS 4.3fixed in avahi 0.6.28-4 (bookworm)2011
CVE-2011-1002 [MEDIUM] CVE-2011-1002: avahi - avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attacke... avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244. Scope: local bookworm: resolved (fixed in 0.6.28-4) bullseye: resolved (fixed in 0.6.28-4) forky: r
debian
CVE-2010-2244MEDIUMCVSS 5.0fixed in avahi 0.6.26-1 (bookworm)2010
CVE-2010-2244 [MEDIUM] CVE-2010-2244: avahi - The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.... The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081. Scope: local bookworm: resolved (fixed in 0.6.26-1)
debian