rhcos vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rhcos package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Information Exposure

*
  • L
Heap-based Buffer Overflow

*
  • M
Directory Traversal

*
  • H
Improper Encoding or Escaping of Output

*
  • L
Covert Timing Channel

*
  • L
Out-of-bounds Write

*
  • M
Directory Traversal

*
  • H
Improper Privilege Management

*
  • H
Symlink Following

*
  • M
Race Condition

*
  • L
Improper Encoding or Escaping of Output

*
  • M
Detection of Error Condition Without Action

*
  • H
Out-of-Bounds

*
  • H
Improper Privilege Management

*
  • L
Insecure Default Initialization of Resource

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Symlink Following

*
  • H
Improper Authentication

*
  • L
Comparison Using Wrong Factors

*
  • M
Use of Insufficiently Random Values

*
  • M
Small Space of Random Values

*
  • M
Improper Input Validation

*
  • M
Unchecked Input for Loop Condition

*
  • L
Improper Certificate Validation

*
  • L
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Improper Finite State Machines (FSMs) in Hardware Logic

*
  • M
Improper Certificate Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Directory Traversal

*
  • M
Double Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Double Free

*
  • H
Use After Free

*
  • L
Out-of-bounds Read

*
  • M
Improper Synchronization

*
  • L
NULL Pointer Dereference

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
CVE-2024-4076

*
  • H
Arbitrary Code Injection

*
  • M
Race Condition

*
  • H
Race Condition

*
  • L
Information Exposure

*
  • M
CVE-2024-26602

*