rhcos vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rhcos package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Write

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Directory Traversal

*
  • H
Use After Free

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Out-of-bounds Write

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • H
Improper Privilege Management

*
  • L
Covert Timing Channel

*
  • H
Improper Encoding or Escaping of Output

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Race Condition

*
  • H
Out-of-Bounds

*
  • M
Detection of Error Condition Without Action

*
  • M
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Directory Traversal

*
  • M
Information Exposure

*
  • H
Symlink Following

*
  • L
Insecure Default Initialization of Resource

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Symlink Following

*
  • M
Improper Authorization

*
  • M
Small Space of Random Values

*
  • M
Use of Insufficiently Random Values

*
  • L
Comparison Using Wrong Factors

*
  • H
Improper Authentication

*
  • M
Link Following

*
  • L
Use After Free

*
  • M
Unchecked Input for Loop Condition

*
  • L
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Improper Finite State Machines (FSMs) in Hardware Logic

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Double Free

*
  • L
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • H
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • H
Use After Free

*
  • L
Double Free

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Improper Synchronization

*
  • L
NULL Pointer Dereference

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
CVE-2024-4076

*
  • H
Arbitrary Code Injection

*
  • M
Race Condition

*
  • H
Memory Leak

*
  • H
Race Condition

*
  • L
Information Exposure

*
  • M
CVE-2024-26602

*