rhcos vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rhcos package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

*
  • H
Improper Authentication

*
  • L
Memory Leak

*
  • H
Directory Traversal

*
  • M
Unchecked Input for Loop Condition

*
  • H
Out-of-bounds Read

*
  • H
Expired Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Reachable Assertion

*
  • M
Out-of-Bounds

*
  • L
Reachable Assertion

*
  • M
Integer Overflow or Wraparound

*
  • L
External Control of System or Configuration Setting

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
Insufficiently Protected Credentials

*
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Directory Traversal

*
  • H
Numeric Truncation Error

*
  • M
Directory Traversal

*
  • L
Arbitrary Argument Injection

*
  • M
Directory Traversal

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Double Free

*
  • M
Improper Certificate Validation

*
  • M
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
OS Command Injection

*
  • H
External Control of File Name or Path

*
  • H
Interpretation Conflict

*
  • M
Buffer Overflow

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • M
Incorrect Calculation

*
  • M
Return of Wrong Status Code

*
  • L
Use After Free

*
  • M
Double Free

*
  • H
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • H
Directory Traversal

*
  • M
Uncontrolled Recursion

*
  • L
Resource Exhaustion

*
  • L
Stack-based Buffer Overflow

*
  • M
Directory Traversal

*
  • M
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • H
Integer Overflow or Wraparound

*
  • L
Off-by-one Error

*
  • L
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Buffer Overflow

*
  • M
Buffer Over-read

*
  • M
Integer Overflow or Wraparound

*
  • M
Untrusted Search Path

*
  • M
Stack-based Buffer Overflow

*
  • M
Incorrect Privilege Assignment

*
  • M
Missing Authentication for Critical Function

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Reversible One-Way Hash

*
  • H
Heap-based Buffer Overflow

*
  • M
Expected Behavior Violation

*
  • M
Out-of-bounds Read

*
  • M
Return of Wrong Status Code

*
  • L
Memory Leak

*
  • H
NULL Pointer Dereference

*
  • M
Uncontrolled Recursion

*
  • M
Arbitrary Argument Injection

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Use of Uninitialized Resource

*
  • H
Buffer Overflow

*
  • M
Information Exposure

*
  • M
Unchecked Return Value

*
  • L
Improper Resource Shutdown or Release

*
  • H
Directory Traversal

*
  • H
Out-of-bounds Write

*
  • M
Use After Free

*
  • H
Stack-based Buffer Overflow

*
  • M
Trust Boundary Violation

*
  • M
Improper Update of Reference Count

*
  • M
Integer Overflow or Wraparound

*
  • M
Unchecked Return Value

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Detection of Error Condition Without Action

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • H
Resource Exhaustion

*
  • M
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
Incorrect Calculation of Buffer Size

*
  • H
Resource Exhaustion

*
  • M
Algorithmic Complexity

*
  • M
Algorithmic Complexity

*
  • M
Use After Free

*
  • M
Improper Encoding or Escaping of Output

*
  • M
Information Exposure

*
  • M
Directory Traversal

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Detection of Error Condition Without Action

*
  • L
Heap-based Buffer Overflow

*
  • H
Use of Uninitialized Resource

*
  • M
Race Condition

*
  • L
Improper Encoding or Escaping of Output

*
  • L
Out-of-bounds Write

*
  • L
Covert Timing Channel

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • M
Directory Traversal

*
  • H
Symlink Following

*
  • L
Insecure Default Initialization of Resource

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Use of Insufficiently Random Values

*
  • L
Comparison Using Wrong Factors

*
  • M
Symlink Following

*
  • M
Small Space of Random Values

*
  • H
Improper Authentication

*
  • L
Improper Certificate Validation

*
  • L
Use After Free

*
  • M
Unchecked Input for Loop Condition

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Improper Finite State Machines (FSMs) in Hardware Logic

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • M
Double Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • H
Use After Free

*
  • L
Double Free

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Improper Synchronization

*
  • H
CVE-2024-4076

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Arbitrary Code Injection

*
  • M
Race Condition

*
  • H
Race Condition

*
  • L
Information Exposure

*
  • M
CVE-2024-26602

*