CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
Issue Overview:
avahi-daemon denial of service can be caused by unprivileged users via DBus (CVE-2023-1981)
Affected Packages:
avahi
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update avahi to update your system.
New Packages:
aarch64:
avahi-0.6.31-20.amzn2.0.1.aarch64
avahi-tools-0.6.31-20.amzn2.0.1.aarch64
avahi-ui-tools-0.6.31-20.amzn2.0.1.aarch64
avahi-glib-0.6.31-20.amzn2.0.1.aarch64
avahi-glib-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-gobject-0.6.31-20.amzn2.0.1.aarch64
avahi-gobject-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-ui-0.6.31-20.amzn2.0.1.aarch64
avahi-ui-gtk3-0.6.31-20.amzn2.0.1.aarch64
avahi-ui-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-qt3-0.6.31-20.amzn2.0.1.aarch64
avahi-qt3-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-qt4-0.6.31-20.amzn2.0.1.aarch64
avahi-qt4-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-libs-0.6.31-20.amzn2.0.1.aarch64
avahi-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-compat-howl-0.6.31-20.amzn2.0.1.aarch64
avahi-compat-howl-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-compat-libdns_sd-0.6.31-20.amzn2.0.1.aarch64
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.0.1.aarch64
avahi-autoipd-0.6.31-20.amzn2.0.1.aarch64
avahi-dnsconfd-0.6.31-20.amzn2.0.1.aarch64
avahi-debuginfo-0.6.31-20.amzn2.0.1.aarch64
i686:
avahi-0.6.31-20.amzn2.0.1.i686
avahi-tools-0.6.31-20.amzn2.0.1.i686
avahi-ui-tools-0.6.31-20.amzn2.0.1.i686
avahi-glib-0.6.31-20.amzn2.0.1.i686
avahi-glib-devel-0.6.31-20.amzn2.0.1.i686
avahi-gobject-0.6.31-20.amzn2.0.1.i686
avahi-gobject-devel-0.6.31-20.amzn2.0.1.i686
avahi-ui-0.6.31-20.amzn2.0.1.i686
avahi-ui-gtk3-0.6.31-20.amzn2.0.1.i686
avahi-ui-devel-0.6.31-20.amzn2.0.1.i686
avahi-qt3-0.6.31-20.amzn2.0.1.i686
avahi-qt3-devel-0.6.31-20.amzn2.0.1.i686
avahi-qt4-0.6.31-20.amzn2.0.1.i686
avahi-qt4-devel-0.6.31-20.amzn2.0.1.i686
avahi-libs-0.6.31-20.amzn2.0.1.i686
avahi-devel-0.6.31-20.amzn2.0.1.i686
avahi-compat-howl-0.6.31-20.amzn2.0.1.i686
avahi-compat-howl-devel-0.6.31-20.amzn2.0.1.i686
avahi-compat-libdns_sd-0.6.31-20.amzn2.0.1.i686
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.0.1.i686
avahi-autoipd-0.6.31-20.amzn2.0.1.i686
avahi-dnsconfd-0.6.31-20.amzn2.0.1.i686
avahi-debuginfo-0.6.31-20.amzn2.0.1.i686
src:
avahi-0.6.31-20.amzn2.0.1.src
x86_64:
avahi-0.6.31-20.amzn2.0.1.x86_64
avahi-tools-0.6.31-20.amzn2.0.1.x86_64
avahi-ui-tools-0.6.31-20.amzn2.0.1.x86_64
avahi-glib-0.6.31-20.amzn2.0.1.x86_64
avahi-glib-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-gobject-0.6.31-20.amzn2.0.1.x86_64
avahi-gobject-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-ui-0.6.31-20.amzn2.0.1.x86_64
avahi-ui-gtk3-0.6.31-20.amzn2.0.1.x86_64
avahi-ui-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-qt3-0.6.31-20.amzn2.0.1.x86_64
avahi-qt3-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-qt4-0.6.31-20.amzn2.0.1.x86_64
avahi-qt4-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-libs-0.6.31-20.amzn2.0.1.x86_64
avahi-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-compat-howl-0.6.31-20.amzn2.0.1.x86_64
avahi-compat-howl-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-compat-libdns_sd-0.6.31-20.amzn2.0.1.x86_64
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.0.1.x86_64
avahi-autoipd-0.6.31-20.amzn2.0.1.x86_64
avahi-dnsconfd-0.6.31-20.amzn2.0.1.x86_64
avahi-debuginfo-0.6.31-20.amzn2.0.1.x86_64
Red Hat: CVE-2023-1981
Mitre: CVE-2023-1981