Recently, there was a major security issue discovered concerning real-time operating systems using the calloc() function of the c runtime library. This vulnerability enables attackers to perform a denial of service attack or execute arbitrary code. The good news is that PikeOS is not affected by this vulnerability. Furthermore, due to the nature of the PikeOS partioning mechanism there is no attack vector via any potentially insecure guest operating systems.
SYSGO’s in-house guest operating systems targeting security and safety environments, such as ARINC 653 and certified POSIX are also known to be resilient against this kind of attack.
Learn more:Get more information on the security architecture of PikeOS!