CVE-2021-36087

The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.
Configurations

Configuration 1 (hide)

cpe:2.3:o:selinux_project:selinux:3.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

03 Nov 2025, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/10/msg00021.html -

03 Nov 2025, 21:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250207-0004/ -

Information

Published : 2021-07-01 03:15

Updated : 2025-11-03 22:15


NVD link : CVE-2021-36087

Mitre link : CVE-2021-36087

CVE.ORG link : CVE-2021-36087


JSON object : View

Products Affected

fedoraproject

  • fedora

selinux_project

  • selinux
CWE
CWE-125

Out-of-bounds Read