ALSA-2021:4513

Source
https://errata.almalinux.org/8/ALSA-2021-4513.html
Import Source
https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2021:4513.json
JSON Data
https://api.osv.dev/v1/vulns/ALSA-2021:4513
Related
Published
2021-11-09T09:39:50Z
Modified
2023-03-13T16:33:57Z
Summary
Moderate: libsepol security update
Details

The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).

Security Fix(es):

  • libsepol: use-after-free in _cilverify_classperms() (CVE-2021-36084)

  • libsepol: use-after-free in _cilverify_classperms() (CVE-2021-36085)

  • libsepol: use-after-free in cilresetclasspermission() (CVE-2021-36086)

  • libsepol: heap-based buffer overflow in ebitmapmatchany() (CVE-2021-36087)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.

References

Affected packages

AlmaLinux:8 / libsepol

Package

Name
libsepol

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9-3.el8

AlmaLinux:8 / libsepol-devel

Package

Name
libsepol-devel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9-3.el8

AlmaLinux:8 / libsepol-static

Package

Name
libsepol-static

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9-3.el8