Vulnerabilities (CVE)

Filtered by vendor Redhat Subscribe
Filtered by product Hardened Images
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-2100 2 P11-kit Project, Redhat 3 P11-kit, Enterprise Linux, Hardened Images 2026-04-25 N/A 5.3 MEDIUM
A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.
CVE-2026-5121 2 Libarchive, Redhat 4 Libarchive, Enterprise Linux, Hardened Images and 1 more 2026-04-23 N/A 7.5 HIGH
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.
CVE-2026-5704 2 Gnu, Redhat 3 Tar, Enterprise Linux, Hardened Images 2026-04-22 N/A 5.0 MEDIUM
A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.
CVE-2026-1584 2 Gnu, Redhat 2 Gnutls, Hardened Images 2026-04-22 N/A 7.5 HIGH
A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.
CVE-2026-4775 3 Debian, Libtiff, Redhat 4 Debian Linux, Libtiff, Enterprise Linux and 1 more 2026-04-21 N/A 7.8 HIGH
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.