{"schema_version":"1.7.2","id":"OESA-2022-1753","modified":"2022-07-15T11:03:59Z","published":"2022-07-15T11:03:59Z","upstream":["CVE-2021-36086"],"summary":"libsepol security update","details":"libsepol provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies such as customizing policy boolean settings.\r\n\r\nSecurity Fix(es):\r\n\r\nThe CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).(CVE-2021-36086)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"libsepol","purl":"pkg:rpm/openEuler/libsepol\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1-8.oe1"}]}],"ecosystem_specific":{"aarch64":["libsepol-debugsource-3.1-8.oe1.aarch64.rpm","libsepol-debuginfo-3.1-8.oe1.aarch64.rpm","libsepol-devel-3.1-8.oe1.aarch64.rpm","libsepol-3.1-8.oe1.aarch64.rpm"],"noarch":["libsepol-help-3.1-8.oe1.noarch.rpm"],"src":["libsepol-3.1-8.oe1.src.rpm"],"x86_64":["libsepol-3.1-8.oe1.x86_64.rpm","libsepol-devel-3.1-8.oe1.x86_64.rpm","libsepol-debugsource-3.1-8.oe1.x86_64.rpm","libsepol-debuginfo-3.1-8.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"libsepol","purl":"pkg:rpm/openEuler/libsepol\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1-8.oe1"}]}],"ecosystem_specific":{"aarch64":["libsepol-3.1-8.oe1.aarch64.rpm","libsepol-debuginfo-3.1-8.oe1.aarch64.rpm","libsepol-devel-3.1-8.oe1.aarch64.rpm","libsepol-debugsource-3.1-8.oe1.aarch64.rpm"],"noarch":["libsepol-help-3.1-8.oe1.noarch.rpm"],"src":["libsepol-3.1-8.oe1.src.rpm"],"x86_64":["libsepol-debugsource-3.1-8.oe1.x86_64.rpm","libsepol-debuginfo-3.1-8.oe1.x86_64.rpm","libsepol-devel-3.1-8.oe1.x86_64.rpm","libsepol-3.1-8.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1753"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-36086"}],"database_specific":{"severity":"Low"}}