CVE-2026-24401 Overview
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. A denial of service vulnerability exists in Avahi versions 0.9rc2 and below that allows remote attackers to crash the avahi-daemon through a segmentation fault. The vulnerability is triggered by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.local"). This causes unbounded recursion in the lookup_handle_cname function, leading to stack exhaustion and service termination.
Critical Impact
Remote attackers can crash the Avahi daemon on vulnerable systems, disrupting local network service discovery capabilities for all dependent applications including nss-mdns resolvers.
Affected Products
- Avahi versions 0.9rc2 and below
- Systems using record browsers with AVAHI_LOOKUP_USE_MULTICAST flag set
- Applications dependent on nss-mdns for name resolution
Discovery Timeline
- 2026-01-24 - CVE CVE-2026-24401 published to NVD
- 2026-01-26 - Last updated in NVD database
Technical Details for CVE-2026-24401
Vulnerability Analysis
This vulnerability stems from improper handling of self-referential CNAME records in the Avahi mDNS implementation. The weakness is classified as CWE-674 (Uncontrolled Recursion), where the lookup_handle_cname function fails to implement adequate recursion depth limits when processing DNS CNAME chains.
When a malicious mDNS response is received containing a CNAME record that references itself (e.g., "h.local" pointing to "h.local"), the lookup function enters an infinite recursion loop. Each recursive call consumes stack memory, and without proper bounds checking, this leads to complete stack exhaustion and a segmentation fault that terminates the avahi-daemon process.
The vulnerability specifically affects record browsers where the AVAHI_LOOKUP_USE_MULTICAST flag is explicitly set. This includes record browsers created by resolvers used by nss-mdns, making the impact particularly significant for systems relying on multicast DNS for local hostname resolution.
Root Cause
The root cause is uncontrolled recursion in the CNAME resolution logic within the lookup_handle_cname function. The code does not validate whether a CNAME record creates a circular reference before following the alias chain, nor does it enforce a maximum recursion depth. This allows an attacker to craft a minimal malicious mDNS response that triggers infinite recursion until the process stack is exhausted.
Attack Vector
The attack vector is network-based and requires no authentication or user interaction beyond having a victim system reachable on the same local network segment. An attacker sends a specially crafted unsolicited mDNS response packet to the target system.
The malicious packet contains a CNAME record with a circular reference where both the alias name and canonical name fields contain identical domain values. When the avahi-daemon processes this response as part of a lookup operation, it recursively follows the CNAME reference without detecting the cycle, resulting in stack exhaustion and a crash.
The attack is particularly effective because mDNS operates on multicast addresses, allowing a single malicious packet to potentially affect multiple vulnerable systems on the same network segment simultaneously.
Detection Methods for CVE-2026-24401
Indicators of Compromise
- Unexpected avahi-daemon process crashes or restarts in system logs
- Segmentation fault entries in syslog associated with avahi-daemon
- Intermittent local hostname resolution failures via mDNS
- Unusual mDNS traffic patterns containing self-referential CNAME records
Detection Strategies
- Monitor system logs for avahi-daemon segfault signals and core dumps
- Implement network monitoring for mDNS packets containing CNAME records with circular references
- Deploy process monitoring to detect repeated avahi-daemon restarts indicative of exploitation
- Analyze captured mDNS traffic for anomalous CNAME record patterns
Monitoring Recommendations
- Configure alerting on avahi-daemon process state changes and unexpected terminations
- Enable detailed mDNS packet logging at network boundaries where feasible
- Implement watchdog monitoring for critical service discovery dependencies
- Review system journal entries for recurring stack overflow or recursion-related errors
How to Mitigate CVE-2026-24401
Immediate Actions Required
- Update Avahi to a version containing commit 78eab31128479f06e30beb8c1cbf99dd921e2524 or later
- Disable avahi-daemon on systems where mDNS service discovery is not required
- Implement network segmentation to limit mDNS traffic exposure
- Monitor for exploitation attempts while patch deployment is in progress
Patch Information
The vulnerability has been patched in commit 78eab31128479f06e30beb8c1cbf99dd921e2524. Organizations should apply this fix by updating to a patched version of Avahi. For detailed information about the fix, refer to the GitHub Commit Update. Additional context is available in the GitHub Issue Discussion and the GitHub Security Advisory.
Workarounds
- Disable Avahi services if mDNS functionality is not operationally required using systemctl disable --now avahi-daemon
- Configure firewall rules to block incoming mDNS traffic (UDP port 5353) from untrusted network segments
- Limit mDNS to trusted network interfaces only through Avahi configuration
- Consider using alternative DNS resolution mechanisms where mDNS is not strictly necessary
# Disable avahi-daemon service
sudo systemctl stop avahi-daemon
sudo systemctl disable avahi-daemon
# Alternative: Block mDNS traffic with firewall
sudo iptables -A INPUT -p udp --dport 5353 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


