Direct Vulnerabilities

Known vulnerabilities in the rhcos package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
OS Command Injection

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Improper Validation of Consistency within Input

*
  • M
Directory Traversal

*
  • L
OS Command Injection

*
  • H
Improper Preservation of Permissions

*
  • M
Improper Handling of Inconsistent Special Elements

*
  • H
Least Privilege Violation

*
  • M
Improper Handling of Case Sensitivity

*
  • M
External Control of File Name or Path

*
  • M
OS Command Injection

*
  • L
Missing Authentication for Critical Function

*
  • M
Buffer Overflow

*
  • M
Directory Traversal

*
  • L
Misinterpretation of Input

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Integer Overflow or Wraparound

*
  • M
Incorrect Check of Function Return Value

*
  • M
Use of Unmaintained Third Party Components

*
  • H
Expression Language Injection

*
  • M
Reachable Assertion

*
  • M
CVE-2026-5121

*
  • M
Expired Pointer Dereference

*
  • M
Buffer Underflow

*
  • M
Misinterpretation of Input

*
  • M
Incorrect Execution-Assigned Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • M
Expired Pointer Dereference

*
  • M
Improper Handling of Structural Elements

*
  • H
OS Command Injection

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • L
Inappropriate Encoding for Output Context

*
  • M
Out-of-bounds Read

*
  • M
Link Following

*
  • M
Incorrect Bitwise Shift of Integer

*
  • H
Reachable Assertion

*
  • H
Out-of-bounds Read

*
  • M
Improper Access Control

*
  • L
Use of Uninitialized Resource

*
  • H
Access of Uninitialized Pointer

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Stack-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Buffer Underflow

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
External Control of File Name or Path

*
  • M
Directory Traversal

*
  • M
Algorithmic Complexity

*
  • M
Out-of-bounds Read

*
  • M
CVE-2026-23865

*
  • L
NULL Pointer Dereference

*
  • M
OS Command Injection

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • L
Double Free

*
  • L
Unchecked Input for Loop Condition

*
  • M
Incorrect Execution-Assigned Permissions

*
  • L
Incorrect Calculation of Multi-Byte String Length

*
  • M
Buffer Overflow

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Information Exposure

*
  • M
Authentication Bypass by Primary Weakness

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Out-of-bounds Read

*
  • M
Buffer Underflow

*
  • L
Unchecked Input for Loop Condition

*
  • M
Incorrect Implementation of Authentication Algorithm

*
  • L
NULL Pointer Dereference

*
  • M
Directory Traversal

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Deserialization of Untrusted Data

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Buffer Overflow

*
  • M
Expired Pointer Dereference

*
  • L
Reachable Assertion

*
  • L
Access of Uninitialized Pointer

*
  • M
Directory Traversal

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Buffer Overflow

*
  • M
Memory Leak

*
  • M
Memory Leak

*
  • M
Improper Validation of Specified Type of Input

*
  • H
Link Following

*
  • M
Buffer Overflow

*
  • M
Uncontrolled Recursion

*
  • L
Improper Validation of Specified Quantity in Input

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Buffer Overflow

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Improper Validation of Specified Type of Input

*
  • L
Missing Required Cryptographic Step

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Out-of-bounds Write

*
  • M
Improper Handling of Parameters

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Stack-based Buffer Overflow

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Use of Uninitialized Resource

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • H
Directory Traversal

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Uncontrolled Recursion

*
  • M
Uncontrolled Recursion

*
  • L
Resource Exhaustion

*
  • M
Use of Uninitialized Resource

*
  • L
Integer Overflow or Wraparound

*
  • M
Integer Underflow

*
  • M
Out-of-bounds Read

*
  • L
Buffer Overflow

*
  • H
Buffer Overflow

*
  • M
Reachable Assertion

*
  • M
Out-of-bounds Read

*
  • M
Reachable Assertion

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Reachable Assertion

*
  • M
Resource Exhaustion

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • H
Out-of-Bounds

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Integer Overflow or Wraparound

*
  • H
Improper Input Validation

*
  • H
Resource Exhaustion

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Unrestricted Externally Accessible Lock

*
  • M
Improper Use of Validation Framework

*
  • L
Algorithmic Complexity

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • M
Integer Overflow or Wraparound

*
  • M
Expired Pointer Dereference

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Expired Pointer Dereference

*
  • M
CVE-2025-61662

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Key Exchange without Entity Authentication

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • H
Link Following

*
  • H
Link Following

*
  • H
Link Following

*
  • M
Stack-based Buffer Overflow

*
  • H
Resource Exhaustion

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • L
Out-of-bounds Read

*
  • L
Unchecked Return Value

*
  • M
Improper Validation of Specified Quantity in Input

*
  • H
Use of Uninitialized Resource

*
  • H
Double Free

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Improper Privilege Management

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Failure to Sanitize Special Element

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • L
Out-of-bounds Read

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
Expired Pointer Dereference

*
  • M
Creation of Temporary File With Insecure Permissions

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • H
Improper Authentication

*
  • M
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • H
Directory Traversal

*
  • M
Unchecked Input for Loop Condition

*
  • H
Expired Pointer Dereference

*
  • H
Out-of-bounds Read

*
  • L
Reachable Assertion

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • L
External Control of System or Configuration Setting

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
Insufficiently Protected Credentials

*
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Directory Traversal

*
  • H
Numeric Truncation Error

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Arbitrary Argument Injection

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
OS Command Injection

*
  • M
Buffer Overflow

*
  • H
Arbitrary Argument Injection

*
  • H
CRLF Injection

*
  • M
Incorrect Calculation

*
  • M
Return of Wrong Status Code

*
  • M
Double Free

*
  • L
Use After Free

*
  • H
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • H
Improper Certificate Validation

*
  • L
Resource Exhaustion

*
  • M
Uncontrolled Recursion

*
  • L
Stack-based Buffer Overflow

*
  • M
Directory Traversal

*
  • M
Out-of-bounds Write

*
  • L
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • H
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Uncontrolled Search Path Element

*
  • M
Race Condition

*
  • M
Out-of-Bounds

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-Bounds

*
  • M
Buffer Overflow

*
  • M
Buffer Over-read

*
  • M
Integer Overflow or Wraparound

*
  • M
Untrusted Search Path

*
  • M
Stack-based Buffer Overflow

*
  • M
Incorrect Privilege Assignment

*
  • M
Missing Authentication for Critical Function

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Reversible One-Way Hash

*
  • M
Expected Behavior Violation

*
  • M
Out-of-bounds Read

*
  • M
Return of Wrong Status Code

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • H
NULL Pointer Dereference

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Arbitrary Argument Injection

*
  • H
Use After Free

*
  • M
Uncontrolled Recursion

*
  • M
Use of Uninitialized Resource

*
  • H
Buffer Overflow

*
  • M
Information Exposure

*
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • H
Directory Traversal

*
  • M
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • H
Stack-based Buffer Overflow

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Trust Boundary Violation

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Improper Update of Reference Count

*
  • M
Out-of-bounds Write

*
  • M
Unchecked Return Value

*
  • M
Detection of Error Condition Without Action

*
  • L
Out-of-Bounds

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Out-of-Bounds

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Algorithmic Complexity

*
  • M
Algorithmic Complexity

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Use After Free

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Out-of-bounds Write

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • H
Improper Privilege Management

*
  • L
Covert Timing Channel

*
  • M
Inappropriate Encoding for Output Context

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Race Condition

*
  • H
Use of Uninitialized Resource

*
  • M
Detection of Error Condition Without Action

*
  • M
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Directory Traversal

*
  • M
Information Exposure

*
  • H
Symlink Following

*
  • L
Insecure Default Initialization of Resource

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Symlink Following

*
  • M
Improper Authorization

*
  • M
Small Space of Random Values

*
  • M
Use of Insufficiently Random Values

*
  • L
Comparison Using Wrong Factors

*
  • H
Improper Authentication

*
  • M
Link Following

*
  • L
Use After Free

*
  • M
Unchecked Input for Loop Condition

*
  • L
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Improper Finite State Machines (FSMs) in Hardware Logic

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Double Free

*
  • L
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • H
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • H
Use After Free

*
  • L
Double Free

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Improper Synchronization

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
CVE-2024-4076

*
  • H
Arbitrary Code Injection

*
  • M
Race Condition

*
  • H
Memory Leak

*
  • H
Race Condition

*
  • L
Information Exposure

*
  • M
CVE-2024-26602

*