realtime-kernel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the realtime-kernel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Write

*
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • L
Use of Insufficiently Random Values

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Improper Input Validation

*
  • L
Numeric Range Comparison Without Minimum Check

*
  • L
Information Exposure

*
  • L
Out-of-bounds Read

*
  • L
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Information Exposure

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Unchecked Error Condition

*
  • L
Error Handling

*
  • L
Divide By Zero

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Check of Function Return Value

*
  • L
Information Exposure

*
  • L
Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Heap-based Buffer Overflow

*
  • L
Race Condition

*
  • L
Stack-based Buffer Overflow

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Use After Free

*
  • L
Improper Initialization

*
  • L
Improper Initialization

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
NULL Pointer Dereference

*
  • L
Improper Locking

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Expected Behavior Violation

*
  • L
Improper Initialization

*
  • L
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Security Features

*
  • L
Files or Directories Accessible to External Parties

*
  • L
Code

*
  • L
Improper Initialization

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Information Exposure

*
  • L
Out-of-Bounds

*
  • L
Improper Input Validation

*
  • L
Covert Timing Channel

*
  • L
Information Exposure

*
  • L
Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Exhaustion

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Integer Overflow or Wraparound

*
  • M
Information Exposure

*
  • M
Incorrect Privilege Assignment

*
  • M
Use of Uninitialized Resource

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Covert Timing Channel

*
  • M
Use After Free

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Resource Exhaustion

*
  • M
Improper Privilege Management

*
  • M
Access Restriction Bypass

*
  • L
Buffer Overflow

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • L
Deadlock

*
  • M
Use After Free

*
  • M
Race Condition

*
  • L
Improper Cleanup on Thrown Exception

*
  • M
Improper Input Validation

*
  • L
Out-of-Bounds

*
  • L
Incorrect Authorization

*
  • L
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
Reachable Assertion

*
  • M
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • H
Improper Locking

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Improper Initialization

*
  • L
Improper Initialization

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Unchecked Error Condition

*
  • L
Improperly Implemented Security Check for Standard

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Buffer Overflow

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Incorrect Privilege Assignment

*
  • M
Resource Exhaustion

*
  • L
Improper Initialization

*
  • M
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • M
Improper Locking

*
  • M
Race Condition

*
  • H
Resource Exhaustion

*
  • H
Resource Management Errors

*
  • L
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Numeric Errors

*
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • L
Access Restriction Bypass

*
  • L
CVE-2011-2905

*
  • M
Race Condition

*
  • M
CVE-2011-1767

*
  • M
CVE-2011-1023

*
  • H
Improper Input Validation

*
  • L
Access Restriction Bypass

*
  • M
Resource Management Errors

*
  • M
Resource Management Errors

*
  • H
Out-of-Bounds

*
  • H
Stack-based Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
Missing Authorization

*
  • M
Improper Input Validation

*
  • M
Improper Initialization

*
  • M
Resource Exhaustion

*
  • L
Out-of-Bounds

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Improper Handling of Syntactically Invalid Structure

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • H
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • H
Improper Access Control

*
  • H
Resource Management Errors

*
  • M
NULL Pointer Dereference

*
  • H
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Integer Overflow or Wraparound

*
  • M
Memory Leak

*
  • L
Information Exposure

*
  • H
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • L
CVE-2011-1182

*
  • L
Information Exposure

*
  • L
Out-of-Bounds

*
  • M
CVE-2011-3347

*
  • H
CVE-2011-2699

*
  • M
NULL Pointer Dereference

*
  • H
Resource Exhaustion

*
  • H
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • H
Improper Input Validation

*
  • H
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • H
Resource Exhaustion

*
  • H
Numeric Errors

*
  • H
Improper Input Validation

*
  • H
Integer Overflow or Wraparound

*
  • M
CVE-2011-3638

*
  • L
Predictable from Observable State

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Information Exposure

*