Search for packages
| purl | pkg:deb/debian/avahi@0.8-5%2Bdeb11u2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1gkw-3zt3-sbb9
Aliases: CVE-2026-24401 |
avahi: Avahi: Denial of Service via recursive CNAME record in mDNS response |
Affected by 0 other vulnerabilities. |
|
VCID-1qch-uvj9-nucr
Aliases: CVE-2025-68471 |
avahi: Avahi: Denial of Service via unsolicited CNAME announcements |
Affected by 0 other vulnerabilities. |
|
VCID-4xxj-5827-gqck
Aliases: CVE-2023-38473 |
avahi: Reachable assertion in avahi_alternative_host_name |
Affected by 5 other vulnerabilities. |
|
VCID-82ze-32xz-pqgn
Aliases: CVE-2023-38469 |
avahi: Reachable assertion in avahi_dns_packet_append_record |
Affected by 5 other vulnerabilities. |
|
VCID-9mjb-81e1-qbau
Aliases: CVE-2023-38471 |
avahi: Reachable assertion in dbus_set_host_name |
Affected by 5 other vulnerabilities. |
|
VCID-9w4x-33np-2fg4
Aliases: CVE-2023-38470 |
avahi: Reachable assertion in avahi_escape_label |
Affected by 5 other vulnerabilities. |
|
VCID-c1wj-a2qm-wbhr
Aliases: CVE-2025-68468 |
avahi: Avahi: Denial of Service via crafted mDNS/DNS-SD announcements |
Affected by 0 other vulnerabilities. |
|
VCID-g2fk-pmey-ekh9
Aliases: CVE-2023-1981 |
avahi: avahi-daemon can be crashed via DBus |
Affected by 5 other vulnerabilities. |
|
VCID-gmfp-mzuj-d7gz
Aliases: CVE-2023-38472 |
avahi: Reachable assertion in avahi_rdata_parse |
Affected by 5 other vulnerabilities. |
|
VCID-nbtb-77zf-kkh8
Aliases: CVE-2024-52616 |
avahi: Avahi Wide-Area DNS Predictable Transaction IDs |
Affected by 0 other vulnerabilities. |
|
VCID-unwy-8b3g-hbbx
Aliases: CVE-2025-68276 |
avahi: Avahi: Denial of Service via D-Bus record browsers with AVAHI_LOOKUP_USE_WIDE_AREA flag |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-7afj-kkdv-zbez | avahi: Multicast DNS responds to unicast queries outside of local network |
CVE-2017-6519
|
| VCID-ezsn-vvex-gkah | avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product. |
CVE-2021-26720
|
| VCID-hjrp-3yew-wqeg | avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames |
CVE-2021-3502
|
| VCID-rpzc-ryw1-p7e5 | avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket |
CVE-2021-3468
|