Out-of-Bounds Affecting libsepol package, versions <0:2.5-10.amzn2.0.1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN2-LIBSEPOL-6016208
- published 20 Oct 2023
- disclosed 1 Jul 2021
Introduced: 1 Jul 2021
CVE-2021-36087 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2
libsepol
to version 0:2.5-10.amzn2.0.1 or higher.
This issue was patched in ALAS2-2023-2307
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libsepol
package and not the libsepol
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2
relevant fixed versions and status.
The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
- https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
- https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ%40mail.gmail.com/T/