kernel-rt-trace vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-rt-trace package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Authentication Bypass

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Memory Leak

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Resource Exhaustion

*
  • L
Information Exposure

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Use of Insufficiently Random Values

*
  • L
Numeric Range Comparison Without Minimum Check

*
  • L
Information Exposure

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Unchecked Error Condition

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Check of Function Return Value

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Error Handling

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Information Exposure

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Race Condition

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Locking

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Information Exposure

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Information Exposure

*
  • L
Improper Initialization

*
  • L
Code

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Expected Behavior Violation

*
  • L
Unchecked Error Condition

*
  • L
Improper Cross-boundary Removal of Sensitive Data

*
  • L
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Out-of-Bounds

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Files or Directories Accessible to External Parties

*
  • L
Information Exposure

*
  • L
Covert Timing Channel

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Improper Initialization

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Security Features

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Access Restriction Bypass

*
  • L
CVE-2011-2905

*
  • L
Numeric Errors

*
  • M
Information Exposure

*
  • M
Missing XML Validation

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Improper Authorization

*
  • M
External Control of Critical State Data

*
  • M
Use After Free

*
  • M
Improper Access Control

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
Reachable Assertion

*
  • M
Incorrect Privilege Assignment

*
  • M
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Covert Timing Channel

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Out-of-bounds Write

*
  • M
Heap-based Buffer Overflow

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Use of Uninitialized Resource

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Use After Free

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Resource Exhaustion

*
  • M
CVE-2011-3638

*
  • M
CVE-2011-3347

*
  • H
Out-of-bounds Write

*
  • H
Use After Free

*
  • H
Stack-based Buffer Overflow

*
  • H
Resource Management Errors

*
  • H
Improper Input Validation

*
  • H
Resource Exhaustion

*
  • H
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

*
  • H
Resource Exhaustion

*
  • H
CVE-2011-2699

*
  • H
Out-of-Bounds

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Execution with Unnecessary Privileges

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • L
Information Exposure

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Resource Exhaustion

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Out-of-Bounds

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
Integer Overflow or Wraparound

*
  • L
Out-of-Bounds

*
  • L
Divide By Zero

*
  • L
Deadlock

*
  • L
Out-of-Bounds

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Incorrect Authorization

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
Buffer Overflow

*
  • L
Predictable from Observable State

*
  • L
Improper Initialization

*
  • L
Improper Initialization

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Use After Free

*
  • L
Information Exposure

*
  • L
Improper Initialization

*
  • L
Missing Initialization of a Variable

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • M
Improper Locking

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use of Insufficiently Random Values

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Improper Input Validation

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Expected Behavior Violation

*
  • M
Improper Locking

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Execution with Unnecessary Privileges

*
  • M
Execution with Unnecessary Privileges

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Missing Authorization

*
  • M
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Incorrect Privilege Assignment

*
  • M
Improper Handling of Syntactically Invalid Structure

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Heap-based Buffer Overflow

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Initialization

*
  • M
Improper Locking

*
  • M
Race Condition

*
  • M
Resource Exhaustion

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • H
Heap-based Buffer Overflow

*
  • H
Improper Input Validation

*
  • H
Heap-based Buffer Overflow

*
  • H
Heap-based Buffer Overflow

*
  • H
Improper Access Control

*
  • H
Information Exposure

*
  • H
Integer Overflow or Wraparound

*
  • H
Improper Locking

*
  • H
Incorrect Permission Assignment for Critical Resource

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Out-of-Bounds

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Resource Exhaustion

*
  • M
Use of Uninitialized Resource

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*