CVE-2021-36087Out-of-bounds Read in Project Selinux

Severity
3.3LOWNVD
EPSS
0.0%
top 93.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 1
Latest updateMay 24

Description

The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 1.8 | Impact: 1.4

Affected Packages2 packages

debiandebian/libsepol< libsepol 3.3-1 (bookworm)

Also affects: Fedora 35

Patches

🔴Vulnerability Details

3
GHSA
GHSA-xjc2-37xp-26m5: The CIL compiler in SELinux 32022-05-24
OSV
libsepol vulnerabilities2022-04-27
OSV
CVE-2021-36087: The CIL compiler in SELinux 32021-07-01

📋Vendor Advisories

3
Ubuntu
libsepol vulnerabilities2022-04-27
Red Hat
libsepol: heap-based buffer overflow in ebitmap_match_any()2021-04-19
Debian
CVE-2021-36087: libsepol - The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_mat...2021
CVE-2021-36087 — Out-of-bounds Read in Project Selinux | cvebase