fwupd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the fwupd package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Plaintext Storage of a Password

<0:1.7.8-2.el8_8
  • M
Plaintext Storage of a Password

<0:1.7.8-2.el8_8
  • M
Plaintext Storage of a Password

<0:1.7.8-2.el8_8
  • M
Plaintext Storage of a Password

<0:1.7.8-2.el8_8
  • M
Plaintext Storage of a Password

<0:1.7.4-3.el8_6
  • M
Plaintext Storage of a Password

<0:1.7.4-3.el8_6
  • M
Plaintext Storage of a Password

<0:1.7.4-3.el8_6
  • M
Plaintext Storage of a Password

<0:1.7.4-3.el8_6
  • M
Plaintext Storage of a Password

<0:1.7.8-2.el8
  • M
Download of Code Without Integrity Check

*
  • M
Download of Code Without Integrity Check

*
  • M
Download of Code Without Integrity Check

*
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-4.el8_1
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-4.el8_1
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-4.el8_1
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-4.el8_1
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.1.4-9.el8_2
  • M
Stack-based Buffer Overflow

<0:1.1.4-9.el8_2
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.1.4-4.el8_1
  • M
Stack-based Buffer Overflow

<0:1.1.4-9.el8_2
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.1.4-9.el8_2
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Stack-based Buffer Overflow

<0:1.1.4-4.el8_1
  • M
Stack-based Buffer Overflow

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-4.el8_1
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.5.9-1.el8_4
  • M
Out-of-bounds Write

<0:1.1.4-4.el8_1
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-9.el8_2
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.1.4-9.el8_2
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.1.4-9.el8_2
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.1.4-4.el8_1
  • M
Improper Authorization

<0:1.1.4-9.el8_2
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.1.4-4.el8_1
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.5.9-1.el8_4
  • M
Improper Authorization

<0:1.1.4-9.el8_2
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.1.4-9.el8_2
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.1.4-4.el8_1
  • M
Use After Free

<0:1.1.4-9.el8_2
  • M
Use After Free

<0:1.1.4-4.el8_1
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.1.4-9.el8_2
  • M
Use After Free

<0:1.5.9-1.el8_4
  • M
Use After Free

<0:1.1.4-9.el8_2
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.1.4-4.el8_1
  • M
Incomplete Blacklist

<0:1.1.4-9.el8_2
  • M
Incomplete Blacklist

<0:1.1.4-9.el8_2
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.1.4-9.el8_2
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.1.4-9.el8_2
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.1.4-4.el8_1
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Incomplete Blacklist

<0:1.5.9-1.el8_4
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_0
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-2.el8_0
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-2.el8_1
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-2.el8_1
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Out-of-bounds Write

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-2.el8_1
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-2.el8_1
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-2.el8_0
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Expected Behavior Violation

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_0
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_0
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-2.el8_0
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-2.el8_1
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-2.el8_1
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Use After Free

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_0
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_0
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • M
Integer Overflow or Wraparound

<0:1.1.4-7.el8_2
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8
  • L
Improper Verification of Cryptographic Signature

<0:1.4.2-4.el8