kernel-rt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-rt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Resource Exhaustion

*
  • L
Out-of-Bounds

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
Information Exposure

*
  • L
Out-of-Bounds

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Race Condition

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Out-of-bounds Write

*
  • L
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • M
Use of Insufficiently Random Values

*
  • M
Out-of-Bounds

*
  • L
Information Exposure

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Unchecked Return Value

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • M
Missing XML Validation

*
  • M
Use After Free

*
  • M
Improper Authorization

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Access Control

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
External Control of Critical State Data

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • L
Improper Cleanup on Thrown Exception

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Expected Behavior Violation

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Execution with Unnecessary Privileges

*
  • M
Use After Free

*
  • L
Memory Leak

*
  • M
Information Exposure

*
  • L
Out-of-bounds Read

*
  • M
Information Exposure

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
NULL Pointer Dereference

*
  • H
Incorrect Permission Assignment for Critical Resource

*
  • M
Use After Free

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Out-of-bounds Write

*
  • L
Missing Initialization of a Variable

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • H
Information Exposure

*
  • M
Resource Exhaustion

*
  • L
Divide By Zero

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • L
Execution with Unnecessary Privileges

*
  • M
Information Exposure

*
  • H
Heap-based Buffer Overflow

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Improper Locking

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • H
Heap-based Buffer Overflow

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Locking

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Heap-based Buffer Overflow

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
Resource Exhaustion

*
  • M
Execution with Unnecessary Privileges

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Arbitrary Code Injection

*
  • M
Use of Uninitialized Resource

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Heap-based Buffer Overflow

*
  • M
Use After Free

*
  • H
Improper Input Validation

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Authentication Bypass

*
  • M
Use After Free

*