Uncontrolled Recursion Affecting avahi-gobject package, versions *


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.04% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Uncontrolled Recursion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS8-AVAHIGOBJECT-15129029
  • published28 Jan 2026
  • disclosed24 Jan 2026

Introduced: 24 Jan 2026

CVE-2026-24401  (opens in a new tab)
CWE-674  (opens in a new tab)

How to fix?

There is no fixed version for Centos:8 avahi-gobject.

NVD Description

Note: Versions mentioned in the description apply only to the upstream avahi-gobject package and not the avahi-gobject package as distributed by Centos. See How to fix? for Centos:8 relevant fixed versions and status.

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.local"). This causes unbounded recursion in the lookup_handle_cname function, leading to stack exhaustion. The vulnerability affects record browsers where AVAHI_LOOKUP_USE_MULTICAST is set explicitly, which includes record browsers created by resolvers used by nss-mdns. This issue is patched in commit 78eab31128479f06e30beb8c1cbf99dd921e2524.

CVSS Base Scores

version 3.1