shim-x64 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the shim-x64 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Write

*
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • H
Integer Overflow or Wraparound

<0:15.8-4.el9_3
  • H
Origin Validation Error

<0:15.8-4.el9_3
  • H
NULL Pointer Dereference

<0:15.8-4.el9_3
  • H
Buffer Overflow

<0:15.6-1.el9
  • H
Use After Free

<0:15.6-1.el9
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Integer Underflow

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Integer Overflow or Wraparound

<0:15.8-3.el9_2
  • H
Origin Validation Error

<0:15.8-3.el9_2
  • H
NULL Pointer Dereference

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Integer Overflow or Wraparound

<0:15.8-3.el9_2
  • H
Origin Validation Error

<0:15.8-3.el9_2
  • H
NULL Pointer Dereference

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9_2
  • H
Integer Overflow or Wraparound

<0:15.8-3.el9_2
  • H
Origin Validation Error

<0:15.8-3.el9_2
  • H
NULL Pointer Dereference

<0:15.8-3.el9_2
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Integer Overflow or Wraparound

<0:15.8-3.el9
  • H
Origin Validation Error

<0:15.8-3.el9
  • H
NULL Pointer Dereference

<0:15.8-3.el9
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Out-of-bounds Read

<0:15.8-3.el9
  • H
Integer Overflow or Wraparound

<0:15.8-3.el9
  • H
Origin Validation Error

<0:15.8-3.el9
  • H
NULL Pointer Dereference

<0:15.8-3.el9
  • H
NULL Pointer Dereference

<0:15.8-4.el9_3
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • H
Origin Validation Error

<0:15.8-4.el9_3
  • H
Integer Overflow or Wraparound

<0:15.8-4.el9_3
  • H
Out-of-bounds Read

<0:15.8-4.el9_3
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Improper Certificate Validation

*
  • L
Improper Certificate Validation

*
  • L
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • H
Buffer Overflow

<0:15.6-1.el9
  • H
Buffer Overflow

<0:15.6-1.el9
  • H
Buffer Overflow

<0:15.6-1.el9
  • H
Buffer Overflow

<0:15.6-1.el9
  • H
Buffer Overflow

<0:15.6-1.el9
  • H
Buffer Overflow

<0:15.6-1.el9
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el9
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el9
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el9
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el9
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el9
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el9
  • H
Integer Underflow

<0:15.6-1.el9
  • H
Integer Underflow

<0:15.6-1.el9
  • H
Integer Underflow

<0:15.6-1.el9
  • H
Integer Underflow

<0:15.6-1.el9
  • H
Integer Underflow

<0:15.6-1.el9
  • H
Integer Underflow

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Use After Free

<0:15.6-1.el9
  • H
Use After Free

<0:15.6-1.el9
  • H
Use After Free

<0:15.6-1.el9
  • H
Use After Free

<0:15.6-1.el9
  • H
Use After Free

<0:15.6-1.el9
  • H
Use After Free

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9
  • H
Out-of-bounds Write

<0:15.6-1.el9