Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions up to and including 0.9-rc2, the simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local DoS. Although `CLIENTS_MAX` is defined, `server_work()` unconditionally `accept()`s and `client_new()` always appends the new client and increments `n_clients`. There is no check against the limit. When client cannot be accepted as a result of maximal socket number of avahi-daemon, it logs unconditionally error per each connection. Unprivileged local users can exhaust daemon memory and file descriptors, causing a denial of service system-wide for mDNS/DNS-SD. Exhausting local file descriptors causes increased system load caused by logging errors of each of request. Overloading prevents glibc calls using nss-mdns plugins to resolve `*.local.` names and link-local addresses. As of time of publication, no known patched versions are available, but a candidate fix is available in pull request 808, and some workarounds are available. Simple clients are offered for nss-mdns package functionality. It is not possible to disable the unix socket `/run/avahi-daemon/socket`, but resolution requests received via DBus are not affected directly. Tools avahi-resolve, avahi-resolve-address and avahi-resolve-host-name are not affected, they use DBus interface. It is possible to change permissions of unix socket after avahi-daemon is started. But avahi-daemon does not provide any configuration for it. Additional access restrictions like SELinux can also prevent unwanted tools to access the socket and keep resolution working for trusted users.
References
| Link | Resource |
|---|---|
| https://github.com/avahi/avahi/pull/808 | Issue Tracking Patch |
| https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q | Exploit Vendor Advisory |
| https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 | Third Party Advisory Exploit |
| http://www.openwall.com/lists/oss-security/2025/12/19/1 | Mailing List Exploit |
Configurations
Configuration 1 (hide)
|
History
16 Jan 2026, 16:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/avahi/avahi/pull/808 - Issue Tracking, Patch | |
| References | () https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q - Exploit, Vendor Advisory | |
| References | () https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 - Third Party Advisory, Exploit | |
| References | () http://www.openwall.com/lists/oss-security/2025/12/19/1 - Mailing List, Exploit | |
| CPE | cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:* cpe:2.3:a:avahi:avahi:0.9:rc1:*:*:*:*:*:* |
|
| First Time |
Avahi
Avahi avahi |
19 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-18 21:15
Updated : 2026-01-16 16:50
NVD link : CVE-2025-59529
Mitre link : CVE-2025-59529
CVE.ORG link : CVE-2025-59529
JSON object : View
Products Affected
avahi
- avahi
CWE
CWE-400
Uncontrolled Resource Consumption
