{"id":"MGASA-2024-0016","summary":"Updated avahi packages fix security vulnerabilities","details":"The updated packages fix security vulnerabilities:\nA vulnerability was found in Avahi, where a reachable assertion exists\nin avahi_dns_packet_append_record. (CVE-2023-38469)\nA vulnerability was found in Avahi. A reachable assertion exists in the\navahi_escape_label() function. (CVE-2023-38470)\nA vulnerability was found in Avahi. A reachable assertion exists in the\ndbus_set_host_name function. (CVE-2023-38471)\nA vulnerability was found in Avahi. A reachable assertion exists in the\navahi_rdata_parse() function. (CVE-2023-38472)\nA vulnerability was found in Avahi. A reachable assertion exists in the\navahi_alternative_host_name() function. (CVE-2023-38473)\n","modified":"2026-01-31T18:06:45.642472Z","published":"2024-01-25T11:21:08Z","related":["CVE-2023-38469","CVE-2023-38470","CVE-2023-38471","CVE-2023-38472","CVE-2023-38473"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2024-0016.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=32363"}],"affected":[{"package":{"name":"avahi","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/avahi?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8-10.1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0016.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}