CVE-2021-26720
Summary
| CVE | CVE-2021-26720 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-02-17 22:15:00 UTC |
| Updated | 2022-12-06 21:52:00 UTC |
| Description | avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Bug 1180827 – VUL-0: CVE-2021-26720: avahi: outdated and insecure if-up script avahi-daemon-check-dns.sh |
MISC |
bugzilla.suse.com |
Issue Tracking, Third Party Advisory |
| Bug #1870824 “Errors in script /usr/lib/avahi/avahi-daemon-check...” : Bugs : avahi package : Ubuntu |
MISC |
bugs.launchpad.net |
Issue Tracking, Third Party Advisory |
| Debian -- Details of package avahi-daemon in sid |
MISC |
packages.debian.org |
Product, Third Party Advisory |
| 404 Not Found |
MISC |
metadata.ftp-master.debian.org |
Broken Link, Third Party Advisory |
| #982796 - buster-pu: package avahi/0.7-4 - Debian Bug report logs |
MISC |
bugs.debian.org |
Mailing List, Third Party Advisory |
| [SECURITY] [DLA 3047-1] avahi security update |
MLIST |
lists.debian.org |
|
| CVE-2021-26720 |
MISC |
security-tracker.debian.org |
Third Party Advisory |
| Debian -- Details of package avahi-daemon in buster |
MISC |
packages.debian.org |
Product, Third Party Advisory |
| oss-security - CVE-2021-26720: avahi-daemon: 'avahi' to 'root' user privilege
escalation through Debian specific if-up script avahi-daemon-check-dns.sh |
MISC |
www.openwall.com |
Mailing List, Third Party Advisory |
| Debian -- Details of package avahi-daemon in bullseye |
MISC |
packages.debian.org |
Product, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179359 Debian Security Update for avahi (DLA 3047-1)
- 179993 Debian Security Update for avahi (CVE-2021-26720)
- 750101 SUSE Enterprise Linux Security Update for avahi (SUSE-SU-2021:1845-1)
- 750337 OpenSUSE Security Update for avahi (openSUSE-SU-2021:0370-1)
- 750789 OpenSUSE Security Update for avahi (openSUSE-SU-2021:1845-1)
- 901804 Common Base Linux Mariner (CBL-Mariner) Security Update for avahi (6323-1)
- 906451 Common Base Linux Mariner (CBL-Mariner) Security Update for avahi (6323-2)