CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
Issue Overview:
A reachable assertion was found in avahi_dns_packet_append_record. (CVE-2023-38469)
A reachable assertion was found in avahi_escape_label. (CVE-2023-38470)
A reachable assertion was found in dbus_set_host_name. (CVE-2023-38471)
Affected Packages:
avahi
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update avahi to update your system.
New Packages:
aarch64:
avahi-0.6.31-20.amzn2.0.2.aarch64
avahi-tools-0.6.31-20.amzn2.0.2.aarch64
avahi-ui-tools-0.6.31-20.amzn2.0.2.aarch64
avahi-glib-0.6.31-20.amzn2.0.2.aarch64
avahi-glib-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-gobject-0.6.31-20.amzn2.0.2.aarch64
avahi-gobject-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-ui-0.6.31-20.amzn2.0.2.aarch64
avahi-ui-gtk3-0.6.31-20.amzn2.0.2.aarch64
avahi-ui-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-qt3-0.6.31-20.amzn2.0.2.aarch64
avahi-qt3-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-qt4-0.6.31-20.amzn2.0.2.aarch64
avahi-qt4-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-libs-0.6.31-20.amzn2.0.2.aarch64
avahi-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-compat-howl-0.6.31-20.amzn2.0.2.aarch64
avahi-compat-howl-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-compat-libdns_sd-0.6.31-20.amzn2.0.2.aarch64
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.0.2.aarch64
avahi-autoipd-0.6.31-20.amzn2.0.2.aarch64
avahi-dnsconfd-0.6.31-20.amzn2.0.2.aarch64
avahi-debuginfo-0.6.31-20.amzn2.0.2.aarch64
i686:
avahi-0.6.31-20.amzn2.0.2.i686
avahi-tools-0.6.31-20.amzn2.0.2.i686
avahi-ui-tools-0.6.31-20.amzn2.0.2.i686
avahi-glib-0.6.31-20.amzn2.0.2.i686
avahi-glib-devel-0.6.31-20.amzn2.0.2.i686
avahi-gobject-0.6.31-20.amzn2.0.2.i686
avahi-gobject-devel-0.6.31-20.amzn2.0.2.i686
avahi-ui-0.6.31-20.amzn2.0.2.i686
avahi-ui-gtk3-0.6.31-20.amzn2.0.2.i686
avahi-ui-devel-0.6.31-20.amzn2.0.2.i686
avahi-qt3-0.6.31-20.amzn2.0.2.i686
avahi-qt3-devel-0.6.31-20.amzn2.0.2.i686
avahi-qt4-0.6.31-20.amzn2.0.2.i686
avahi-qt4-devel-0.6.31-20.amzn2.0.2.i686
avahi-libs-0.6.31-20.amzn2.0.2.i686
avahi-devel-0.6.31-20.amzn2.0.2.i686
avahi-compat-howl-0.6.31-20.amzn2.0.2.i686
avahi-compat-howl-devel-0.6.31-20.amzn2.0.2.i686
avahi-compat-libdns_sd-0.6.31-20.amzn2.0.2.i686
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.0.2.i686
avahi-autoipd-0.6.31-20.amzn2.0.2.i686
avahi-dnsconfd-0.6.31-20.amzn2.0.2.i686
avahi-debuginfo-0.6.31-20.amzn2.0.2.i686
src:
avahi-0.6.31-20.amzn2.0.2.src
x86_64:
avahi-0.6.31-20.amzn2.0.2.x86_64
avahi-tools-0.6.31-20.amzn2.0.2.x86_64
avahi-ui-tools-0.6.31-20.amzn2.0.2.x86_64
avahi-glib-0.6.31-20.amzn2.0.2.x86_64
avahi-glib-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-gobject-0.6.31-20.amzn2.0.2.x86_64
avahi-gobject-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-ui-0.6.31-20.amzn2.0.2.x86_64
avahi-ui-gtk3-0.6.31-20.amzn2.0.2.x86_64
avahi-ui-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-qt3-0.6.31-20.amzn2.0.2.x86_64
avahi-qt3-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-qt4-0.6.31-20.amzn2.0.2.x86_64
avahi-qt4-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-libs-0.6.31-20.amzn2.0.2.x86_64
avahi-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-compat-howl-0.6.31-20.amzn2.0.2.x86_64
avahi-compat-howl-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-compat-libdns_sd-0.6.31-20.amzn2.0.2.x86_64
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.0.2.x86_64
avahi-autoipd-0.6.31-20.amzn2.0.2.x86_64
avahi-dnsconfd-0.6.31-20.amzn2.0.2.x86_64
avahi-debuginfo-0.6.31-20.amzn2.0.2.x86_64
Red Hat: CVE-2023-38469, CVE-2023-38470, CVE-2023-38471
Mitre: CVE-2023-38469, CVE-2023-38470, CVE-2023-38471