Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.local"). This causes unbounded recursion in the lookuphandlecname function, leading to stack exhaustion. The vulnerability affects record browsers where AVAHILOOKUPUSE_MULTICAST is set explicitly, which includes record browsers created by resolvers used by nss-mdns. This issue is patched in commit 78eab31128479f06e30beb8c1cbf99dd921e2524.
{
"cwe_ids": [
"CWE-674"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24401.json",
"cna_assigner": "GitHub_M"
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-24401.json"
[
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 724.0,
"function_hash": "332737092712039648650165003545039931030"
},
"signature_version": "v1",
"source": "https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524",
"id": "CVE-2026-24401-173bd870",
"target": {
"file": "avahi-core/browse.c",
"function": "lookup_handle_cname"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"151505114680226689991009913718028681377",
"156292945866089260300898979064104515909",
"102594860459434896414600153339778576587",
"271740318055916461206324138873014224655",
"212433022854709265375621083468558640536",
"15743829998157019946019777875182439863"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524",
"id": "CVE-2026-24401-2058ab72",
"target": {
"file": "avahi-core/browse.c"
}
}
]