rhcos vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rhcos package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Unrestricted Externally Accessible Lock

*
  • M
Improper Use of Validation Framework

*
  • L
Algorithmic Complexity

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

*
  • H
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Expired Pointer Dereference

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Expired Pointer Dereference

*
  • M
CVE-2025-61662

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • H
Use After Free

*
  • M
Key Exchange without Entity Authentication

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Link Following

*
  • H
Link Following

*
  • H
Link Following

*
  • M
Stack-based Buffer Overflow

*
  • L
Improper Resource Shutdown or Release

*
  • L
Improper Resource Shutdown or Release

*
  • M
Out-of-Bounds

*
  • M
Integer Overflow or Wraparound

*
  • H
Resource Exhaustion

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • L
Out-of-Bounds

*
  • L
Unchecked Return Value

*
  • M
Improper Validation of Specified Quantity in Input

*
  • H
Use of Uninitialized Resource

*
  • H
Double Free

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Improper Privilege Management

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Failure to Sanitize Special Element

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • L
Out-of-bounds Read

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Expired Pointer Dereference

*
  • M
Creation of Temporary File With Insecure Permissions

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • H
Improper Authentication

*
  • M
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • H
Directory Traversal

*
  • M
Unchecked Input for Loop Condition

*
  • H
Expired Pointer Dereference

*
  • H
Out-of-bounds Read

*
  • L
Reachable Assertion

*
  • L
Out-of-Bounds

*
  • L
Reachable Assertion

*
  • M
Out-of-Bounds

*
  • M
Integer Overflow or Wraparound

*
  • L
External Control of System or Configuration Setting

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
Insufficiently Protected Credentials

*
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Directory Traversal

*
  • H
Numeric Truncation Error

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Arbitrary Argument Injection

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
OS Command Injection

*
  • M
Buffer Overflow

*
  • H
External Control of File Name or Path

*
  • H
Interpretation Conflict

*
  • M
Incorrect Calculation

*
  • M
Return of Wrong Status Code

*
  • M
Double Free

*
  • L
Use After Free

*
  • H
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • H
Improper Certificate Validation

*
  • L
Resource Exhaustion

*
  • M
Uncontrolled Recursion

*
  • L
Stack-based Buffer Overflow

*
  • M
Directory Traversal

*
  • M
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Off-by-one Error

*
  • L
Out-of-bounds Read

*
  • H
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Out-of-Bounds

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-Bounds

*
  • M
Buffer Overflow

*
  • M
Buffer Over-read

*
  • M
Integer Overflow or Wraparound

*
  • M
Untrusted Search Path

*
  • M
Stack-based Buffer Overflow

*
  • M
Incorrect Privilege Assignment

*
  • M
Missing Authentication for Critical Function

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Reversible One-Way Hash

*
  • M
Expected Behavior Violation

*
  • M
Out-of-bounds Read

*
  • M
Return of Wrong Status Code

*
  • L
Memory Leak

*
  • H
NULL Pointer Dereference

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Arbitrary Argument Injection

*
  • H
Use After Free

*
  • M
Uncontrolled Recursion

*
  • M
Use of Uninitialized Resource

*
  • H
Buffer Overflow

*
  • M
Information Exposure

*
  • M
Unchecked Return Value

*
  • L
Improper Resource Shutdown or Release

*
  • H
Directory Traversal

*
  • M
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • H
Stack-based Buffer Overflow

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Trust Boundary Violation

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Improper Update of Reference Count

*
  • M
Out-of-bounds Write

*
  • M
Unchecked Return Value

*
  • M
Detection of Error Condition Without Action

*
  • L
Out-of-Bounds

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
Out-of-Bounds

*
  • L
Memory Leak

*
  • M
Algorithmic Complexity

*
  • M
Algorithmic Complexity

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Use After Free

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Out-of-bounds Write

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • H
Improper Privilege Management

*
  • L
Covert Timing Channel

*
  • M
Improper Encoding or Escaping of Output

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Race Condition

*
  • H
Use of Uninitialized Resource

*
  • M
Detection of Error Condition Without Action

*
  • M
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Directory Traversal

*
  • M
Information Exposure

*
  • H
Symlink Following

*
  • L
Insecure Default Initialization of Resource

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Symlink Following

*
  • M
Improper Authorization

*
  • M
Small Space of Random Values

*
  • M
Use of Insufficiently Random Values

*
  • L
Comparison Using Wrong Factors

*
  • H
Improper Authentication

*
  • M
Link Following

*
  • L
Use After Free

*
  • M
Unchecked Input for Loop Condition

*
  • L
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Improper Finite State Machines (FSMs) in Hardware Logic

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Double Free

*
  • L
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • H
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • H
Use After Free

*
  • L
Double Free

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Improper Synchronization

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
CVE-2024-4076

*
  • H
Arbitrary Code Injection

*
  • M
Race Condition

*
  • H
Memory Leak

*
  • H
Race Condition

*
  • L
Information Exposure

*
  • M
CVE-2024-26602

*