
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in Avahi, identified as CVE-2023-38471, which involves a reachable assertion in the dbussethost_name function. The vulnerability was initially reported on April 28, 2023, and affects Avahi versions up to (excluding) 0.9. This security issue impacts various Linux distributions including Red Hat Enterprise Linux, Ubuntu, and Debian systems (NVD, Ubuntu Security).
The vulnerability has been assigned a CVSS 3.1 base score of 5.5 (Medium severity) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The technical assessment indicates that the vulnerability requires local access, has low attack complexity, requires low privileges, and needs no user interaction. While it doesn't impact confidentiality or integrity, it can have a high impact on system availability (NVD).
The vulnerability primarily affects system availability, with no direct impact on confidentiality or integrity. The presence of a reachable assertion in the dbussethost_name function could potentially lead to service disruption or system instability (NVD).
Multiple vendors have released patches to address this vulnerability. Ubuntu has fixed the issue across multiple releases including 23.10, 23.04, 22.04 LTS, and 20.04 LTS. Red Hat has addressed the vulnerability through several security advisories including RHSA-2023:7836, RHSA-2024:0418, and RHSA-2024:0576 for different versions of Red Hat Enterprise Linux (Ubuntu Security, Red Hat Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."