Homepage
  1. Snyk Vulnerability Database
  2. Linux
  3. centos
  4. centos:8
  5. shim

shim

Report a new vulnerability Found a mistake?

Direct Vulnerabilities

Known vulnerabilities in the shim package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Integer Overflow or Wraparound

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
CVE-2026-28387

*
  • L
NULL Pointer Dereference

*
  • L
Improper Handling of Missing Special Element

*
  • M
NULL Pointer Dereference

*
  • L
Improper Validation of Specified Type of Input

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Validation of Specified Quantity in Input

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Missing Required Cryptographic Step

*
  • M
Improper Handling of Parameters

*
  • L
Out-of-bounds Write

*
  • L
Covert Timing Channel

*
  • L
Information Exposure

*
  • L
Resource Exhaustion

*
  • M
Improper Certificate Validation

*
  • L
Improper Certificate Validation

*
  • L
Resource Exhaustion

*
                               
Product
  • Partners
  • Developers & Devops Features
  • Enterprise Features
  • Pricing
  • Test with GitHub
  • Test with CLI
  • API status
Resources
  • Vulnerability DB
  • Blog
  • Documentation
  • FAQs
Company
  • About
  • Jobs
  • Contact
  • Legal terms
  • Privacy
  • Press kit
  • Events
Contact us
  • Support
  • Report a new vuln

Find us online

Track our development

DevSecOps Community Podcast

© 2026 Snyk Ltd.