Redhat » Enterprise Linux » 7.0 : Security Vulnerabilities
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
Max Base Score | 7.8 |
Published | 2023-09-25 |
Updated | 2023-09-27 |
EPSS | 0.04% |
A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure.
Max Base Score | 7.8 |
Published | 2023-07-10 |
Updated | 2023-07-18 |
EPSS | 0.06% |
A heap buffer overflow vulnerability was found in sox, in the startread function at sox/src/hcom.c:160:41. This flaw can lead to a denial of service, code execution, or information disclosure.
Max Base Score | 7.8 |
Published | 2023-07-10 |
Updated | 2023-07-19 |
EPSS | 0.04% |
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
Max Base Score | 7.8 |
Published | 2023-05-30 |
Updated | 2023-08-31 |
EPSS | 0.05% |
A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
Max Base Score | 9.8 |
Published | 2023-05-30 |
Updated | 2023-08-31 |
EPSS | 0.53% |
A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
Max Base Score | 5.5 |
Published | 2023-05-30 |
Updated | 2023-08-31 |
EPSS | 0.04% |
A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.
Max Base Score | 6.2 |
Published | 2023-07-10 |
Updated | 2023-08-13 |
EPSS | 0.06% |
CVE-2023-32373
Known Exploited Vulnerability
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Max Base Score | 8.8 |
Published | 2023-06-23 |
Updated | 2023-08-29 |
EPSS | 0.10% |
KEV Added | 2023-05-22 |
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Max Base Score | 7.8 |
Published | 2023-05-08 |
Updated | 2023-09-28 |
EPSS | 0.04% |
Apptainer is an open source container platform for Linux. There is an ext4 use-after-free flaw that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal. Use-after-free flaws in the kernel can be used to attack the kernel for denial of service and potentially for privilege escalation.
Apptainer 1.1.8 includes a patch that by default disables mounting of extfs filesystem types in setuid-root mode, while continuing to allow mounting of extfs filesystems in non-setuid "rootless" mode using fuse2fs.
Some workarounds are possible. Either do not install apptainer-suid (for versions 1.1.0 through 1.1.7) or set `allow setuid = no` in apptainer.conf. This requires having unprivileged user namespaces enabled and except for apptainer 1.1.x versions will disallow mounting of sif files, extfs files, and squashfs files in addition to other, less significant impacts. (Encrypted sif files are also not supported unprivileged in apptainer 1.1.x.). Alternatively, use the `limit containers` options in apptainer.conf/singularity.conf to limit sif files to trusted users, groups, and/or paths, and set `allow container extfs = no` to disallow mounting of extfs overlay files. The latter option by itself does not disallow mounting of extfs overlay partitions inside SIF files, so that's why the former options are also needed.
Max Base Score | 7.8 |
Published | 2023-04-25 |
Updated | 2023-07-08 |
EPSS | 0.04% |
A floating point exception vulnerability was found in sox, in the lsx_aiffstartwrite function at sox/src/aiff.c:622:58. This flaw can lead to a denial of service.
Max Base Score | 6.2 |
Published | 2023-07-10 |
Updated | 2023-07-19 |
EPSS | 0.06% |
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Max Base Score | 5.9 |
Published | 2023-09-18 |
Updated | 2023-10-04 |
EPSS | 0.05% |
A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.
Max Base Score | 7.1 |
Published | 2023-08-16 |
Updated | 2023-09-18 |
EPSS | 0.04% |
A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.
Max Base Score | 7.1 |
Published | 2023-09-25 |
Updated | 2023-09-26 |
EPSS | 0.06% |
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
Max Base Score | 7.8 |
Published | 2023-08-10 |
Updated | 2023-09-19 |
EPSS | 0.04% |
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
Max Base Score | 7.5 |
Published | 2023-07-11 |
Updated | 2023-08-29 |
EPSS | 0.05% |
A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
Max Base Score | 3.3 |
Published | 2023-06-06 |
Updated | 2023-06-14 |
EPSS | 0.04% |
A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.
Max Base Score | 6.7 |
Published | 2023-05-08 |
Updated | 2023-05-15 |
EPSS | 0.04% |
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
Max Base Score | 5.5 |
Published | 2023-05-26 |
Updated | 2023-06-02 |
EPSS | 0.04% |
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
Max Base Score | 6.5 |
Published | 2023-05-15 |
Updated | 2023-05-28 |
EPSS | 0.06% |
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
Max Base Score | 3.3 |
Published | 2023-03-23 |
Updated | 2023-05-03 |
EPSS | 0.05% |
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Max Base Score | 6.6 |
Published | 2023-03-27 |
Updated | 2023-05-03 |
EPSS | 0.04% |
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
Max Base Score | 7.8 |
Published | 2023-03-29 |
Updated | 2023-08-29 |
EPSS | 0.04% |
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Max Base Score | 6.5 |
Published | 2023-08-11 |
Updated | 2023-08-27 |
EPSS | 0.11% |
A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
Max Base Score | 6.7 |
Published | 2022-08-26 |
Updated | 2022-09-01 |
EPSS | 0.06% |