Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-36087

Опубликовано: 19 апр. 2021
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libsepolNot affected
Red Hat Enterprise Linux 7libsepolFix deferred
Red Hat Enterprise Linux 9libsepolNot affected
Red Hat Enterprise Linux 8libsepolFixedRHSA-2021:451309.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1979668libsepol: heap-based buffer overflow in ebitmap_match_any()

EPSS

Процентиль: 4%
0.0002
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 4 лет назад

The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.

CVSS3: 3.3
nvd
около 4 лет назад

The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.

CVSS3: 3.3
debian
около 4 лет назад

The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in e ...

github
около 3 лет назад

The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). NOTE: bad0a746e9f4cf260dedba5828d9645d50176aac is cited in the OSV "fixed" field but does not have a code change.

rocky
больше 3 лет назад

Moderate: libsepol security update

EPSS

Процентиль: 4%
0.0002
Низкий

3.3 Low

CVSS3