cluster-md-kmp-rt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cluster-md-kmp-rt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Race Condition

<5.3.18-28.1
  • M
CVE-2021-26932

<5.3.18-28.1
  • M
NULL Pointer Dereference

<5.3.18-28.1
  • M
Allocation of Resources Without Limits or Throttling

<5.3.18-28.1
  • H
CVE-2021-26930

<5.3.18-28.1
  • M
Race Condition

<5.3.18-28.1
  • M
Out-of-Bounds

<5.3.18-28.1
  • M
Improper Input Validation

<5.3.18-28.1
  • H
Integer Overflow or Wraparound

<5.3.18-28.1
  • M
Race Condition

<5.3.18-33.1
  • H
Arbitrary Command Injection

<5.3.18-33.1
  • M
Buffer Overflow

<5.3.18-33.1
  • M
Use After Free

<5.3.18-33.1
  • H
Out-of-bounds Read

<5.3.18-33.1
  • M
Excessive Iteration

<5.3.18-33.1
  • M
Memory Leak

<5.3.18-33.1
  • M
Integer Overflow or Wraparound

<5.3.18-33.1
  • M
Missing Initialization of Resource

<5.3.18-33.1
  • M
CVE-2021-29264

<5.3.18-33.1
  • H
Missing Authorization

<5.3.18-33.1
  • M
Improper Handling of Exceptional Conditions

<5.3.18-33.1
  • M
Race Condition

<5.3.18-33.1
  • L
Memory Leak

<5.3.18-33.1
  • M
Improper Initialization

<5.3.18-33.1
  • H
Out-of-bounds Write

<5.3.18-33.1
  • M
Allocation of Resources Without Limits or Throttling

<5.3.18-33.1
  • H
Out-of-bounds Write

<5.3.18-33.1
  • M
Information Exposure

<5.3.18-33.1
  • H
Memory Leak

<5.3.18-33.1
  • H
CVE-2021-27363

<5.3.18-33.1
  • H
Out-of-bounds Read

<5.3.18-33.1
  • M
CVE-2020-36311

<5.3.18-33.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.3.18-33.1
  • H
Out-of-Bounds

<5.3.18-33.1
  • M
Off-by-one Error

<5.3.18-33.1
  • H
Out-of-bounds Read

<5.3.18-33.1
  • H
Resource Exhaustion

<5.3.18-33.1
  • H
Use After Free

<5.3.18-33.1
  • H
Use After Free

<5.3.18-33.1
  • M
Use After Free

<5.3.18-33.1
  • M
Use After Free

<5.3.18-33.1
  • M
CVE-2021-29650

<5.3.18-36.2
  • M
Out-of-bounds Read

<5.3.18-36.2
  • H
Race Condition

<5.3.18-42.2
  • M
Missing Initialization of Resource

<5.3.18-42.2
  • M
Out-of-bounds Read

<5.3.18-42.2
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<5.3.18-42.2
  • H
Out-of-bounds Read

<5.3.18-42.2
  • H
Use After Free

<5.3.18-42.2
  • H
Out-of-bounds Write

<5.3.18-42.2
  • M
Improper Authentication

<5.3.18-42.2
  • M
CVE-2021-0129

<5.3.18-42.2
  • M
Out-of-bounds Write

<5.3.18-45.3
  • H
Race Condition

<5.3.18-45.3
  • H
Improper Verification of Cryptographic Signature

<5.3.18-45.3
  • H
Out-of-bounds Write

<5.3.18-45.3
  • L
Use of a Broken or Risky Cryptographic Algorithm

<5.3.18-68.1
  • M
Incorrect Type Conversion or Cast

<5.3.18-68.1
  • H
Integer Underflow

<5.3.18-68.1
  • L
Use of a Broken or Risky Cryptographic Algorithm

<5.3.18-68.1
  • M
Improper Authentication

<5.3.18-68.1
  • M
Improper Locking

<5.3.18-68.1
  • M
Race Condition

<5.3.18-68.1
  • H
Race Condition

<5.3.18-68.1
  • M
Memory Leak

<5.3.18-68.1
  • H
Race Condition

<5.3.18-68.1
  • H
Improper Initialization

<5.3.18-76.1
  • M
CVE-2022-0002

<5.3.18-76.1
  • M
CVE-2022-0001

<5.3.18-76.1