Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling the RecordBrowserNew method directly or creating hostname/address/service resolvers/browsers that create those browsers internally themselves.
History

Fri, 16 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.9:rc1:*:*:*:*:*:*

Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Avahi
Avahi avahi
Vendors & Products Avahi
Avahi avahi

Tue, 13 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 12 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling the RecordBrowserNew method directly or creating hostname/address/service resolvers/browsers that create those browsers internally themselves.
Title Avahi has a reachable assertion in avahi_wide_area_scan_cache
Weaknesses CWE-617
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-01-12T17:31:49.652Z

Updated: 2026-01-12T18:41:22.098Z

Reserved: 2025-12-16T14:17:32.388Z

Link: CVE-2025-68276

cve-icon Vulnrichment

Updated: 2026-01-12T18:41:17.960Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-12T18:15:47.560

Modified: 2026-01-16T16:51:03.383

Link: CVE-2025-68276

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-12T17:31:49Z

Links: CVE-2025-68276 - Bugzilla