kernel-firmware vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-firmware package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2023-20533

<20200107-150100.3.40.1
  • M
CVE-2023-20592

<20200107-150100.3.40.1
  • H
CVE-2023-20566

<20200107-150100.3.40.1
  • H
Time-of-check Time-of-use (TOCTOU)

<20200107-150100.3.40.1
  • H
Use After Free

<20200107-150100.3.40.1
  • H
CVE-2023-20526

<20200107-150100.3.40.1
  • H
CVE-2022-23830

<20200107-150100.3.40.1
  • H
Improper Input Validation

<20200107-150100.3.40.1
  • H
CVE-2021-46774

<20200107-150100.3.40.1
  • H
Incomplete Cleanup

<20200107-150100.3.40.1
  • H
Out-of-bounds Read

<20200107-150100.3.40.1
  • M
Information Exposure

<20200107-150100.3.37.1
  • M
CVE-2023-20593

<20200107-150100.3.34.1
  • M
Information Exposure

<20200107-150100.3.31.1
  • M
Improper Input Validation

<20200107-150100.3.31.1
  • M
Improper Check for Unusual or Exceptional Conditions

<20200107-150100.3.31.1
  • M
Out-of-bounds Read

<20200107-150100.3.31.1
  • M
Out-of-Bounds

<20200107-150100.3.31.1
  • M
CVE-2021-26375

<20200107-150100.3.31.1
  • M
CVE-2021-26376

<20200107-150100.3.31.1
  • M
Improper Input Validation

<20200107-150100.3.31.1
  • M
Out-of-Bounds

<20200107-150100.3.31.1
  • M
Out-of-Bounds

<20200107-150100.3.31.1
  • M
Time-of-check Time-of-use (TOCTOU)

<20200107-150100.3.31.1
  • M
CVE-2021-26349

<20200107-150100.3.31.1
  • M
CVE-2021-26348

<20200107-150100.3.31.1
  • M
Improper Validation of Specified Quantity in Input

<20200107-150100.3.31.1
  • M
CVE-2021-26342

<20200107-150100.3.31.1
  • M
CVE-2021-26339

<20200107-150100.3.31.1
  • M
Exposure of Resource to Wrong Sphere

<20200107-150100.3.31.1
  • M
Improper Input Validation

<20200107-150100.3.31.1
  • M
Use of a Broken or Risky Cryptographic Algorithm

<20190618-3.3.1
  • C
CVE-2020-12321

<20200107-3.15.1
  • L
NULL Pointer Dereference

<20200107-3.18.1
  • L
Out-of-Bounds

<20200107-3.18.1
  • L
Improper Input Validation

<20200107-3.18.1
  • H
Integer Overflow or Wraparound

<20200107-3.18.1
  • M
Improper Input Validation

<20200107-3.26.1
  • M
Improper Check for Unusual or Exceptional Conditions

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Information Exposure

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Information Exposure

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
CVE-2021-0164

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1
  • H
Improper Input Validation

<20200107-3.26.1