Bug 1188083 - (CVE-2021-36217) VUL-0: CVE-2021-36217: avahi: local DoS against avahi-daemon via D-Bus interface
(CVE-2021-36217)
VUL-0: CVE-2021-36217: avahi: local DoS against avahi-daemon via D-Bus interface
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: E-mail List
Security Team bot
https://smash.suse.de/issue/303546/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-07-07 11:14 UTC by Matthias Gerstner
Modified: 2021-08-16 19:56 UTC (History)
5 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Gerstner 2021-07-07 11:14:54 UTC
While reviewing the avahi-daemon source code I noticed that we are missing a
couple of fixes that have not been released by upstream and that also didn't
receive a CVE assignment.

The upstream fix is in commit 9d31939e [1].

[1]: https://github.com/lathiat/avahi/commit/9d31939e55280a733d930b15ac9e4dda4497680c

Two reproducers that can trigger these code paths a local unprivileged user:

    dbus-send --system --print-reply --dest=org.freedesktop.Avahi / org.freedesktop.Avahi.Server.ResolveHostName int32:1 int32:0 string:localhost int32:0 uint32:0
    dbus-send --system --print-reply --dest=org.freedesktop.Avahi / org.freedesktop.Avahi.Server.ResolveService int32:1 int32:0 string:ssh string: string: int32:0 uint32:0

The result will be that avahi-daemon triggers an assertion and fails with
SIGABRT, consequently suffering a local DoS.

The Factory version is affected by this, I didn't look into our SLE versions.
Comment 1 Robert Frohl 2021-07-07 12:42:11 UTC
making this public as commit is public too.
Comment 3 Robert Frohl 2021-07-07 12:56:43 UTC
only affects version v0.8 (based on git tag --contains 8f75a04, see [1]) 

[1] https://github.com/lathiat/avahi/commit/9d31939e55280a733d930b15ac9e4dda4497680c
Comment 4 Michael Gorse 2021-07-09 14:36:47 UTC
This is a dup of bug 1184846.
Comment 5 Robert Frohl 2021-07-09 15:08:38 UTC
(In reply to Michael Gorse from comment #4)
> This is a dup of bug 1184846.

crap, I will update the CVE with mitre
Comment 6 Garrett Tucker 2021-08-06 16:42:03 UTC
(In reply to Robert Frohl from comment #5)
> (In reply to Michael Gorse from comment #4)
> > This is a dup of bug 1184846.
> 
> crap, I will update the CVE with mitre

Hey there, I'm Garrett, a Product Security Engineer at Red Hat. Did you end up updating the CVE as a dup with Mitre? We just had this CVE assignment come in and also noticed that it was a dup, but it seems to not have been updated by mitre. Just wanted to check in on that status since it still seems to be listed as it's own CVE.
Comment 7 Robert Frohl 2021-08-09 08:16:32 UTC
(In reply to Garrett Tucker from comment #6)
> (In reply to Robert Frohl from comment #5)
> > (In reply to Michael Gorse from comment #4)
> > > This is a dup of bug 1184846.
> > 
> > crap, I will update the CVE with mitre
> 
> Hey there, I'm Garrett, a Product Security Engineer at Red Hat. Did you end
> up updating the CVE as a dup with Mitre? We just had this CVE assignment
> come in and also noticed that it was a dup, but it seems to not have been
> updated by mitre. Just wanted to check in on that status since it still
> seems to be listed as it's own CVE.

I actually did, but I see no change. I will follow up again.
Comment 8 Robert Frohl 2021-08-09 08:22:59 UTC
(In reply to Robert Frohl from comment #7)
> I actually did, but I see no change. I will follow up again.

I also did only got the response that mitre received my request, but not that the update was published.
Comment 9 Garrett Tucker 2021-08-09 13:21:56 UTC
(In reply to Robert Frohl from comment #8)
> (In reply to Robert Frohl from comment #7)
> > I actually did, but I see no change. I will follow up again.
> 
> I also did only got the response that mitre received my request, but not
> that the update was published.

Hm, that is odd. Hopefully mitre takes action after another follow up. Perhaps the request just fell through the cracks. Thanks for following up on this Robert!
Comment 10 Robert Frohl 2021-08-16 07:20:02 UTC
(In reply to Garrett Tucker from comment #9)
> (In reply to Robert Frohl from comment #8)
> > (In reply to Robert Frohl from comment #7)
> > > I actually did, but I see no change. I will follow up again.
> > 
> > I also did only got the response that mitre received my request, but not
> > that the update was published.
> 
> Hm, that is odd. Hopefully mitre takes action after another follow up.
> Perhaps the request just fell through the cracks. Thanks for following up on
> this Robert!

Just as an update: there is still no update from mitre, not sure if they are struggling with the current load and not looking at all requests.
Comment 11 Garrett Tucker 2021-08-16 19:56:46 UTC
(In reply to Robert Frohl from comment #10)
> (In reply to Garrett Tucker from comment #9)
> > (In reply to Robert Frohl from comment #8)
> > > (In reply to Robert Frohl from comment #7)
> > > > I actually did, but I see no change. I will follow up again.
> > > 
> > > I also did only got the response that mitre received my request, but not
> > > that the update was published.
> > 
> > Hm, that is odd. Hopefully mitre takes action after another follow up.
> > Perhaps the request just fell through the cracks. Thanks for following up on
> > this Robert!
> 
> Just as an update: there is still no update from mitre, not sure if they are
> struggling with the current load and not looking at all requests.

They did actually update it a few days ago: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36217 this hasn't yet been reflected by NIST though. Mitre has not been replying to most requests though, I have sent a few unrelated to this and it seems they just make the changes and do not update or send confirmation of such. Either way, this seems to be fixed now. Thanks for helping out Robert! :)