Browse all 6 CVE security advisories affecting avahi. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Avahi is a zero-configuration networking implementation commonly used for service discovery on local networks, enabling automatic device detection without manual configuration. Historically, it has been susceptible to remote code execution vulnerabilities through malformed network packets, as well as denial-of-service conditions via resource exhaustion attacks. Several CVEs highlight buffer overflow issues in DNS packet handling and insufficient input validation. While no major public security incidents have been widely documented, the consistent presence of memory corruption flaws in its networking components suggests potential for compromise if exposed to untrusted networks. Its default operation on local networks limits attack surface, but misconfigurations can expose systems to unnecessary risk.
CVE-2026-244012026-01-27GHSA-mhf3-865v-g5rc2026-01-20Showing up to 20 recent security advisories. View all →
This page lists every published CVE security advisory associated with avahi. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.