vulnerability
Red Hat: CVE-2021-36087: CVE-2021-36087 libsepol: heap-based buffer overflow in ebitmap_match_any() (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Jul 1, 2021 | Nov 10, 2021 | Aug 11, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 1, 2021
Added
Nov 10, 2021
Modified
Aug 11, 2025
Description
The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-libsepolredhat-upgrade-libsepol-debuginforedhat-upgrade-libsepol-debugsourceredhat-upgrade-libsepol-develredhat-upgrade-libsepol-static
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.