Vulnerability Description
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling the RecordBrowserNew method directly or creating hostname/address/service resolvers/browsers that create those browsers internally themselves.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Avahi | Avahi | < 0.9 |
Related Weaknesses (CWE)
References
- https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688Patch
- https://github.com/avahi/avahi/pull/806Issue TrackingPatch
- https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rcVendor Advisory
FAQ
What is CVE-2025-68276?
CVE-2025-68276 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area ...
How severe is CVE-2025-68276?
CVE-2025-68276 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-68276?
Check the references section above for vendor advisories and patch information. Affected products include: Avahi Avahi.