Debian Libsepol vulnerabilities

4 known vulnerabilities affecting debian/libsepol.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
LOW4

Vulnerabilities

Page 1 of 1
CVE-2021-36085LOWCVSS 3.3fixed in libsepol 3.3-1 (bookworm)2021
CVE-2021-36085 [LOW] CVE-2021-36085: libsepol - The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms ... The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map). Scope: local bookworm: resolved (fixed in 3.3-1) bullseye: resolved (fixed in 3.1-1+deb11u1) forky: resolved (fixed in 3.3-1) sid: resolved (fixed in 3.3-1) trixie: resolved (fixed in 3.3-1)
debian
CVE-2021-36087LOWCVSS 3.3fixed in libsepol 3.3-1 (bookworm)2021
CVE-2021-36087 [LOW] CVE-2021-36087: libsepol - The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_mat... The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block. Scope: local bookworm: resolved (fixed in 3.3-1) bullseye: resolved (fixed in 3.1-1+deb11u1) forky: resolved (fixed in 3.3-1) sid: re
debian
CVE-2021-36086LOWCVSS 3.3fixed in libsepol 3.3-1 (bookworm)2021
CVE-2021-36086 [LOW] CVE-2021-36086: libsepol - The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermissio... The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list). Scope: local bookworm: resolved (fixed in 3.3-1) bullseye: resolved (fixed in 3.1-1+deb11u1) forky: resolved (fixed in 3.3-1) sid: resolved (fixed in 3.3-1) trixie: resolved (fixed in 3.3-1)
debian
CVE-2021-36084LOWCVSS 3.3fixed in libsepol 3.3-1 (bookworm)2021
CVE-2021-36084 [LOW] CVE-2021-36084: libsepol - The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms ... The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper). Scope: local bookworm: resolved (fixed in 3.3-1) bullseye: resolved (fixed in 3.1-1+deb11u1) forky: resolved (fixed in 3.3-1) sid: resolved (fixed in 3.3-1) trixie: resolved (fixed in 3.3-1)
debian
Debian Libsepol vulnerabilities | cvebase