Security Vulnerabilities fixed in libsepol RHSA-2021:4513

description-logoDescription

The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258

affected-products-logoAffected Applications

libsepol