rhcos vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rhcos package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Key Exchange without Entity Authentication

*
  • H
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Link Following

*
  • H
Link Following

*
  • H
Link Following

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-Bounds

*
  • L
Improper Resource Shutdown or Release

*
  • L
Improper Resource Shutdown or Release

*
  • M
Integer Overflow or Wraparound

*
  • H
Resource Exhaustion

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Directory Traversal

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • L
Unchecked Return Value

*
  • L
Out-of-Bounds

*
  • M
Improper Validation of Specified Quantity in Input

*
  • H
Use of Uninitialized Resource

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Double Free

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • H
Improper Privilege Management

*
  • M
Failure to Sanitize Special Element

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Expired Pointer Dereference

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • H
Improper Authentication

*
  • L
Memory Leak

*
  • H
Expired Pointer Dereference

*
  • M
Unchecked Input for Loop Condition

*
  • H
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
Reachable Assertion

*
  • M
Out-of-Bounds

*
  • L
Reachable Assertion

*
  • M
Integer Overflow or Wraparound

*
  • L
External Control of System or Configuration Setting

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
Insufficiently Protected Credentials

*
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Directory Traversal

*
  • H
Numeric Truncation Error

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Arbitrary Argument Injection

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • M
Double Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Certificate Validation

*
  • H
Use After Free

*
  • M
OS Command Injection

*
  • M
Heap-based Buffer Overflow

*
  • H
External Control of File Name or Path

*
  • H
Interpretation Conflict

*
  • M
Buffer Overflow

*
  • M
Return of Wrong Status Code

*
  • M
Incorrect Calculation

*
  • L
Use After Free

*
  • M
Double Free

*
  • H
Incorrect Authorization

*
  • M
Out-of-bounds Read

*
  • L
Resource Exhaustion

*
  • M
Uncontrolled Recursion

*
  • L
Stack-based Buffer Overflow

*
  • M
Directory Traversal

*
  • M
Integer Overflow or Wraparound

*
  • L
Off-by-one Error

*
  • L
Out-of-bounds Read

*
  • L
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Buffer Overflow

*
  • M
Buffer Over-read

*
  • M
Integer Overflow or Wraparound

*
  • M
Untrusted Search Path

*
  • M
Stack-based Buffer Overflow

*
  • M
Incorrect Privilege Assignment

*
  • M
Missing Authentication for Critical Function

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Reversible One-Way Hash

*
  • M
Expected Behavior Violation

*
  • M
Out-of-bounds Read

*
  • M
Return of Wrong Status Code

*
  • L
Memory Leak

*
  • H
NULL Pointer Dereference

*
  • M
Arbitrary Argument Injection

*
  • M
Uncontrolled Recursion

*
  • H
Out-of-bounds Write

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Buffer Overflow

*
  • M
Use of Uninitialized Resource

*
  • M
Information Exposure

*
  • M
Unchecked Return Value

*
  • L
Improper Resource Shutdown or Release

*
  • H
Directory Traversal

*
  • L
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Improper Update of Reference Count

*
  • H
Stack-based Buffer Overflow

*
  • M
Unchecked Return Value

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • M
Trust Boundary Violation

*
  • M
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Detection of Error Condition Without Action

*
  • L
Out-of-Bounds

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
Out-of-Bounds

*
  • L
Memory Leak

*
  • H
Out-of-bounds Write

*
  • M
Algorithmic Complexity

*
  • M
Algorithmic Complexity

*
  • M
Out-of-bounds Write

*
  • M
Incorrect Calculation of Buffer Size

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Use After Free

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Information Exposure

*
  • L
Heap-based Buffer Overflow

*
  • M
Directory Traversal

*
  • M
Improper Encoding or Escaping of Output

*
  • L
Covert Timing Channel

*
  • L
Out-of-bounds Write

*
  • M
Directory Traversal

*
  • H
Symlink Following

*
  • M
Race Condition

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Detection of Error Condition Without Action

*
  • H
Use of Uninitialized Resource

*
  • L
Insecure Default Initialization of Resource

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Symlink Following

*
  • H
Improper Authentication

*
  • L
Comparison Using Wrong Factors

*
  • M
Use of Insufficiently Random Values

*
  • M
Small Space of Random Values

*
  • M
Improper Input Validation

*
  • M
Unchecked Input for Loop Condition

*
  • L
Improper Certificate Validation

*
  • L
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Improper Finite State Machines (FSMs) in Hardware Logic

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Directory Traversal

*
  • M
Double Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Double Free

*
  • H
Use After Free

*
  • L
Out-of-bounds Read

*
  • M
Improper Synchronization

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
CVE-2024-4076

*
  • H
Arbitrary Code Injection

*
  • M
Race Condition

*
  • H
Race Condition

*
  • L
Information Exposure

*
  • M
CVE-2024-26602

*