
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in Avahi, identified as CVE-2023-38473, which involves a reachable assertion in the avahialternativehost_name() function. The vulnerability was initially reported on April 28, 2023, and affects Avahi versions up to (but not including) 0.9. This security issue impacts various Linux distributions including Red Hat Enterprise Linux, Ubuntu, and Debian systems (NVD, Ubuntu Security).
The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The issue is classified as CWE-617 (Reachable Assertion). The vulnerability requires local access with low attack complexity and low privileges, with no user interaction needed. While it doesn't impact confidentiality or integrity, it can have a high impact on system availability (NVD).
The vulnerability primarily affects system availability, with no direct impact on confidentiality or integrity. When exploited, it can lead to a system assertion failure in the avahialternativehost_name() function, potentially causing service disruption (Red Hat CVE).
Multiple vendors have released patches to address this vulnerability. Ubuntu has fixed the issue across multiple releases including 23.10, 23.04, 22.04 LTS, and 20.04 LTS. Red Hat has addressed the vulnerability in Enterprise Linux 8 and 9 through security updates. Debian has also provided fixes in their bullseye and bookworm releases (Ubuntu Security, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."