Direct Vulnerabilities

Known vulnerabilities in the rhcos package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Handling of Inconsistent Special Elements

*
  • H
Improper Preservation of Permissions

*
  • H
Least Privilege Violation

*
  • L
OS Command Injection

*
  • M
OS Command Injection

*
  • M
External Control of File Name or Path

*
  • M
Improper Handling of Case Sensitivity

*
  • L
Missing Authentication for Critical Function

*
  • M
Buffer Overflow

*
  • L
Misinterpretation of Input

*
  • M
Directory Traversal

*
  • M
Incorrect Calculation of Buffer Size

*
  • H
Integer Overflow or Wraparound

*
  • H
Incorrect Check of Function Return Value

*
  • H
Expression Language Injection

*
  • M
Reachable Assertion

*
  • M
Use of Unmaintained Third Party Components

*
  • M
CVE-2026-5121

*
  • M
Misinterpretation of Input

*
  • M
Incorrect Execution-Assigned Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expired Pointer Dereference

*
  • M
Buffer Underflow

*
  • M
Improper Handling of Structural Elements

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • M
Expired Pointer Dereference

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
OS Command Injection

*
  • M
Improper Validation of Specified Type of Input

*
  • L
Inappropriate Encoding for Output Context

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Out-of-bounds Read

*
  • M
Link Following

*
  • M
Incorrect Bitwise Shift of Integer

*
  • H
Reachable Assertion

*
  • H
Out-of-bounds Read

*
  • M
Improper Access Control

*
  • L
Use of Uninitialized Resource

*
  • H
Access of Uninitialized Pointer

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Buffer Underflow

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Information Exposure

*
  • M
Incorrect Implementation of Authentication Algorithm

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • L
Unchecked Input for Loop Condition

*
  • L
External Control of File Name or Path

*
  • M
Buffer Underflow

*
  • L
Unchecked Input for Loop Condition

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2026-23865

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Deserialization of Untrusted Data

*
  • L
Incorrect Calculation of Multi-Byte String Length

*
  • L
NULL Pointer Dereference

*
  • L
Inefficient Regular Expression Complexity

*
  • L
Reachable Assertion

*
  • H
Out-of-bounds Read

*
  • M
Buffer Overflow

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • L
Access of Uninitialized Pointer

*
  • M
Incorrect Execution-Assigned Permissions

*
  • M
Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Directory Traversal

*
  • M
Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • L
Stack-based Buffer Overflow

*
  • M
Expired Pointer Dereference

*
  • L
Double Free

*
  • M
OS Command Injection

*
  • M
Algorithmic Complexity

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Memory Leak

*
  • M
Memory Leak

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Buffer Overflow

*
  • H
Link Following

*
  • L
Improper Validation of Specified Quantity in Input

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Missing Required Cryptographic Step

*
  • L
Improper Validation of Specified Type of Input

*
  • M
Uncontrolled Recursion

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Handling of Parameters

*
  • L
NULL Pointer Dereference

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Use of Uninitialized Resource

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • H
Directory Traversal

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Integer Overflow or Wraparound

*
  • M
Uncontrolled Recursion

*
  • L
Resource Exhaustion

*
  • L
Uncontrolled Recursion

*
  • M
Use of Uninitialized Resource

*
  • L
Buffer Overflow

*
  • H
Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Reachable Assertion

*
  • M
Integer Underflow

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Out-of-bounds Read

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Resource Exhaustion

*
  • M
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Stack-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • H
Out-of-Bounds

*
  • M
Heap-based Buffer Overflow

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Integer Overflow or Wraparound

*
  • H
Improper Input Validation

*
  • H
Resource Exhaustion

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Unrestricted Externally Accessible Lock

*
  • M
Improper Use of Validation Framework

*
  • L
Algorithmic Complexity

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
CVE-2025-61662

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Key Exchange without Entity Authentication

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Stack-based Buffer Overflow

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • H
Resource Exhaustion

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

*
  • L
Out-of-bounds Read

*
  • L
Unchecked Return Value

*
  • M
Improper Validation of Specified Quantity in Input

*
  • H
Use of Uninitialized Resource

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Double Free

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Out-of-bounds Read

*
  • H
Improper Privilege Management

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Failure to Sanitize Special Element

*
  • M
Use After Free

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Out-of-bounds Write

*
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Expired Pointer Dereference

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • H
Improper Authentication

*
  • L
Memory Leak

*
  • H
Directory Traversal

*
  • M
Unchecked Input for Loop Condition

*
  • H
Out-of-bounds Read

*
  • H
Expired Pointer Dereference

*
  • M
Buffer Overflow

*
  • L
Reachable Assertion

*
  • M
Integer Overflow or Wraparound

*
  • L
External Control of System or Configuration Setting

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
Insufficiently Protected Credentials

*
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Directory Traversal

*
  • H
Numeric Truncation Error

*
  • M
Directory Traversal

*
  • L
Arbitrary Argument Injection

*
  • M
Directory Traversal

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Double Free

*
  • M
Improper Certificate Validation

*
  • M
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
OS Command Injection

*
  • H
Arbitrary Argument Injection

*
  • H
CRLF Injection

*
  • M
Buffer Overflow

*
  • M
Incorrect Calculation

*
  • M
Return of Wrong Status Code

*
  • L
Use After Free

*
  • M
Double Free

*
  • H
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • M
Uncontrolled Recursion

*
  • L
Resource Exhaustion

*
  • L
Stack-based Buffer Overflow

*
  • M
Directory Traversal

*
  • M
Out-of-bounds Write

*
  • L
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • H
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • M
Uncontrolled Search Path Element

*
  • M
Race Condition

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Buffer Overflow

*
  • M
Buffer Over-read

*
  • M
Integer Overflow or Wraparound

*
  • M
Untrusted Search Path

*
  • M
Stack-based Buffer Overflow

*
  • M
Incorrect Privilege Assignment

*
  • M
Missing Authentication for Critical Function

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Reversible One-Way Hash

*
  • M
Expected Behavior Violation

*
  • M
Out-of-bounds Read

*
  • M
Return of Wrong Status Code

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • H
NULL Pointer Dereference

*
  • M
Uncontrolled Recursion

*
  • M
Arbitrary Argument Injection

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Use of Uninitialized Resource

*
  • H
Buffer Overflow

*
  • M
Information Exposure

*
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • H
Directory Traversal

*
  • H
Out-of-bounds Write

*
  • M
Use After Free

*
  • H
Stack-based Buffer Overflow

*
  • M
Trust Boundary Violation

*
  • M
Improper Update of Reference Count

*
  • M
Out-of-bounds Write

*
  • M
Unchecked Return Value

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Detection of Error Condition Without Action

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • H
Resource Exhaustion

*
  • M
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
Incorrect Calculation of Buffer Size

*
  • H
Resource Exhaustion

*
  • M
Algorithmic Complexity

*
  • M
Algorithmic Complexity

*
  • M
Use After Free

*
  • M
Inappropriate Encoding for Output Context

*
  • M
Information Exposure

*
  • M
Directory Traversal

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Detection of Error Condition Without Action

*
  • L
Heap-based Buffer Overflow

*
  • H
Use of Uninitialized Resource

*
  • M
Race Condition

*
  • L
Improper Encoding or Escaping of Output

*
  • L
Out-of-bounds Write

*
  • L
Covert Timing Channel

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • M
Directory Traversal

*
  • H
Symlink Following

*
  • L
Insecure Default Initialization of Resource

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Use of Insufficiently Random Values

*
  • L
Comparison Using Wrong Factors

*
  • M
Symlink Following

*
  • M
Small Space of Random Values

*
  • H
Improper Authentication

*
  • L
Improper Certificate Validation

*
  • L
Use After Free

*
  • M
Unchecked Input for Loop Condition

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Improper Finite State Machines (FSMs) in Hardware Logic

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Directory Traversal

*
  • L
Heap-based Buffer Overflow

*
  • M
Double Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • H
Use After Free

*
  • L
Double Free

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Improper Synchronization

*
  • H
CVE-2024-4076

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Arbitrary Code Injection

*
  • M
Race Condition

*
  • H
Race Condition

*
  • L
Information Exposure

*
  • M
CVE-2024-26602

*