CVE-2026-34933
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2026
Last modified:
13/04/2026
Description
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. Prior to version 0.9-rc4, any unprivileged local user can crash avahi-daemon by sending a single D-Bus method call with conflicting publish flags. This issue has been patched in version 0.9-rc4.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:* | 0.9 (excluding) | |
| cpe:2.3:a:avahi:avahi:0.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:avahi:avahi:0.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:avahi:avahi:0.9:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/avahi/avahi/commit/625ca0fac19229f6dfa3a6c6b698ae657187e50c
- https://github.com/avahi/avahi/pull/891
- https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc
- http://www.openwall.com/lists/oss-security/2026/04/11/9
- https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc



