Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-34933
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Apr, 2026 | 23:17
Updated At-13 Apr, 2026 | 17:26

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. Prior to version 0.9-rc4, any unprivileged local user can crash avahi-daemon by sending a single D-Bus method call with conflicting publish flags. This issue has been patched in version 0.9-rc4.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

avahi
avahi
>>avahi>>Versions before 0.9(exclusive)
cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*
avahi
avahi
>>avahi>>0.9
cpe:2.3:a:avahi:avahi:0.9:rc1:*:*:*:*:*:*
avahi
avahi
>>avahi>>0.9
cpe:2.3:a:avahi:avahi:0.9:rc2:*:*:*:*:*:*
avahi
avahi
>>avahi>>0.9
cpe:2.3:a:avahi:avahi:0.9:rc3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-617Secondarysecurity-advisories@github.com
CWE ID: CWE-617
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/avahi/avahi/commit/625ca0fac19229f6dfa3a6c6b698ae657187e50csecurity-advisories@github.com
Patch
https://github.com/avahi/avahi/pull/891security-advisories@github.com
Issue Tracking
Patch
https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvcsecurity-advisories@github.com
Exploit
Patch
Vendor Advisory
http://www.openwall.com/lists/oss-security/2026/04/11/9af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
Third Party Advisory
https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Patch
Vendor Advisory
Hyperlink: https://github.com/avahi/avahi/commit/625ca0fac19229f6dfa3a6c6b698ae657187e50c
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/avahi/avahi/pull/891
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc
Source: security-advisories@github.com
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2026/04/11/9
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Patch
Vendor Advisory
Change History
0Changes found

Details not found