Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 16 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:* cpe:2.3:a:avahi:avahi:0.9:rc1:*:*:*:*:*:* |
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Avahi
Avahi avahi |
|
| Vendors & Products |
Avahi
Avahi avahi |
Tue, 13 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 12 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. As soon as they expire avahi-daemon crashes. | |
| Title | Avahi has a reachable assertion in lookup_multicast_callback | |
| Weaknesses | CWE-617 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-12T18:41:50.855Z
Reserved: 2025-12-18T13:48:59.555Z
Link: CVE-2025-68468
Updated: 2026-01-12T18:41:47.044Z
Status : Analyzed
Published: 2026-01-12T18:15:48.173
Modified: 2026-01-16T16:52:04.260
Link: CVE-2025-68468
OpenCVE Enrichment
Updated: 2026-01-13T09:27:34Z