{"id":"USN-5391-1","summary":"libsepol vulnerabilities","details":"Nicolas Iooss discovered that libsepol incorrectly handled memory\nwhen handling policies. An attacker could possibly use this issue\nto cause a crash, resulting in a denial of service, or possibly\nexecute arbitrary code. (CVE-2021-36084)\n\nIt was discovered that libsepol incorrectly handled memory when\nhandling policies. An attacker could possibly use this issue to cause\na crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2021-36085)\n\nIt was discovered that libsepol incorrectly handled memory when\nhandling policies. An attacker could possibly use this issue to cause\na crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affects Ubuntu 18.04 LTS, \nUbuntu 20.04 LTS and Ubuntu 21.10. (CVE-2021-36086)\n\nIt was discovered that libsepol incorrectly validated certain data,\nleading to a heap overflow. An attacker could possibly use this issue\nto cause a crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2021-36087)\n","modified":"2026-04-22T10:22:59.487432Z","published":"2022-04-27T09:32:18Z","related":["UBUNTU-CVE-2021-36084","UBUNTU-CVE-2021-36085","UBUNTU-CVE-2021-36086","UBUNTU-CVE-2021-36087"],"upstream":["CVE-2021-36084","CVE-2021-36085","CVE-2021-36086","CVE-2021-36087","UBUNTU-CVE-2021-36084","UBUNTU-CVE-2021-36085","UBUNTU-CVE-2021-36086","UBUNTU-CVE-2021-36087"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5391-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-36084"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-36085"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-36086"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-36087"}],"affected":[{"package":{"name":"libsepol","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libsepol@2.4-2ubuntu0.1~esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4-2ubuntu0.1~esm1"}]}],"versions":["2.3-2","2.4-2"],"ecosystem_specific":{"binaries":[{"binary_name":"libsepol1","binary_version":"2.4-2ubuntu0.1~esm1"},{"binary_name":"sepol-utils","binary_version":"2.4-2ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2021-36084","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36085","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36087","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5391-1.json"}},{"package":{"name":"libsepol","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/libsepol@2.7-1ubuntu0.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7-1ubuntu0.1"}]}],"versions":["2.7-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libsepol1","binary_version":"2.7-1ubuntu0.1"},{"binary_name":"sepol-utils","binary_version":"2.7-1ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2021-36084","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36085","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36086","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36087","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5391-1.json"}},{"package":{"name":"libsepol","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/libsepol@3.0-1ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0-1ubuntu0.1"}]}],"versions":["2.9-2","3.0-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libsepol1","binary_version":"3.0-1ubuntu0.1"},{"binary_name":"sepol-utils","binary_version":"3.0-1ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2021-36084","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36085","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36086","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-36087","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5391-1.json"}}],"schema_version":"1.7.5"}