Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:* cpe:2.3:a:avahi:avahi:0.9:rc1:*:*:*:*:*:* cpe:2.3:a:avahi:avahi:0.9:rc2:*:*:*:*:*:* |
Wed, 28 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Avahi
Avahi avahi |
|
| Vendors & Products |
Avahi
Avahi avahi |
Sat, 24 Jan 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.local"). This causes unbounded recursion in the lookup_handle_cname function, leading to stack exhaustion. The vulnerability affects record browsers where AVAHI_LOOKUP_USE_MULTICAST is set explicitly, which includes record browsers created by resolvers used by nss-mdns. This issue is patched in commit 78eab31128479f06e30beb8c1cbf99dd921e2524. | |
| Title | Avahi has Uncontrolled Recursion in lookup_handle_cname function | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-26T16:17:24.487Z
Reserved: 2026-01-22T18:19:49.172Z
Link: CVE-2026-24401
Updated: 2026-01-26T16:14:25.957Z
Status : Analyzed
Published: 2026-01-24T02:15:48.760
Modified: 2026-02-12T15:58:27.273
Link: CVE-2026-24401
OpenCVE Enrichment
Updated: 2026-04-18T03:00:10Z