Selinux Project Selinux vulnerabilities
4 known vulnerabilities affecting selinux_project/selinux.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
LOW4
Vulnerabilities
Page 1 of 1
CVE-2021-36087LOWCVSS 3.3v3.22021-07-01
CVE-2021-36087 [LOW] CWE-125 CVE-2021-36087: The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indir
The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.
nvd
CVE-2021-36084LOWCVSS 3.3v3.22021-07-01
CVE-2021-36084 [LOW] CWE-416 CVE-2021-36084: The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_v
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).
nvd
CVE-2021-36085LOWCVSS 3.3v3.22021-07-01
CVE-2021-36085 [LOW] CWE-416 CVE-2021-36085: The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verif
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).
nvd
CVE-2021-36086LOWCVSS 3.3fixed in 3.32021-07-01
CVE-2021-36086 [LOW] CWE-416 CVE-2021-36086: The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_r
The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).
nvd