First published: Fri Apr 28 2023(Updated: )
A reachable assertion was found in avahi_dns_packet_append_record. References: <a href="https://github.com/lathiat/avahi/issues/455">https://github.com/lathiat/avahi/issues/455</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi Avahi | <0.9 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-38469 is medium with a CVSS score of 6.2.
The affected software includes Avahi version up to exclusive 0.9, Redhat Enterprise Linux 8.0, and Redhat Enterprise Linux 9.0.
To fix CVE-2023-38469, update Avahi to a version that is not vulnerable or apply the necessary patches provided by the vendor.
You can find more information about CVE-2023-38469 in the following references: [Red Hat Security Advisory](https://access.redhat.com/security/cve/CVE-2023-38469), [Bugzilla Report](https://bugzilla.redhat.com/show_bug.cgi?id=2191687), and [GitHub Issue](https://github.com/lathiat/avahi/issues/455).