CVE-2026-34933

NameCVE-2026-34933
DescriptionAvahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. Prior to version 0.9-rc4, any unprivileged local user can crash avahi-daemon by sending a single D-Bus method call with conflicting publish flags. This issue has been patched in version 0.9-rc4.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1132712

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
avahi (PTS)bullseye0.8-5+deb11u2vulnerable
bullseye (security)0.8-5+deb11u3vulnerable
bookworm0.8-10+deb12u1vulnerable
trixie0.8-16vulnerable
forky, sid0.8-18vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
avahisource(unstable)(unfixed)1132712

Notes

[trixie] - avahi <no-dsa> (Minor issue)
[bookworm] - avahi <no-dsa> (Minor issue)
[bullseye] - avahi <postponed> (Minor issue)
https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc
https://github.com/avahi/avahi/pull/891
Fixed by: https://github.com/avahi/avahi/commit/0be89b6bb5c3983837b5e0febcbbbf452ecf7675 (v0.9-rc4)
Test: https://github.com/avahi/avahi/commit/a93fdd980d2db5d453475c0aa2b39946bd6611bd (v0.9-rc4)

Search for package or bug name: Reporting problems