shim vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the shim package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_2
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Out-of-bounds Write

<0:15-8.el7_3
  • M
Out-of-bounds Write

<0:15-8.el7_3
  • M
Out-of-bounds Write

<0:15-8.el7_3
  • M
Out-of-bounds Write

<0:15-8.el7_2
  • M
Expected Behavior Violation

<0:15-8.el7_3
  • M
Expected Behavior Violation

<0:15-8.el7_2
  • M
Expected Behavior Violation

<0:15-8.el7_3
  • M
Expected Behavior Violation

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_2
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Use After Free

<0:15-8.el7_3
  • M
Use After Free

<0:15-8.el7_3
  • M
Use After Free

<0:15-8.el7_2
  • M
Use After Free

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_2
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Integer Overflow or Wraparound

<0:15-8.el7_2
  • M
Integer Overflow or Wraparound

<0:15-8.el7_3
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Read

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Out-of-bounds Write

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0
  • M
Heap-based Buffer Overflow

<0:0.7-8.el7_0