We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
NeKernal is a free and open-source operating system stack. Prior to version 0.0.3, there are several memory safety issues that can lead to memory corruption, disk image corruption, denial of service, and potential code execution. These issues stem from unchecked memory operations, unsafe typecasting, and improper input validation. This issue has been patched in version 0.0.3.
Reserved 2025-06-18 | Published 2025-06-24 | Updated 2025-06-24 | Assigner GitHub_MCWE-20: Improper Input Validation
CWE-770: Allocation of Resources Without Limits or Throttling
github.com/...kernel/security/advisories/GHSA-cmp2-5f6g-mw34
github.com/nekernel-org/nekernel/pull/35
github.com/nekernel-org/nekernel/pull/36
github.com/...ommit/6506875ad0ab210b82a5c4ce227bf851508de17d
github.com/...ommit/6511afbf405c31513bc88ab06bca58218610a994
Support options