First published: Thu Jul 01 2021(Updated: )
SELinux Project SELinux is vulnerable to a denial of service, caused by a use-after-free in __cil_verify_classperms. By sending a specially-crafted request, a local attacker could exploit this vulnerability to cause a denial of service condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SELinux Project SELinux | =3.2 | |
Fedoraproject Fedora | =35 | |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36084 is a vulnerability in SELinux that allows a local attacker to cause a denial of service.
CVE-2021-36084 is caused by a use-after-free vulnerability in __cil_verify_classperms, which can be exploited by sending a specially-crafted request.
The severity of CVE-2021-36084 is medium, with a CVSS score of 6.2.
To fix CVE-2021-36084 in IBM QRadar SIEM 7.5.0 GA, you can apply the patch available from IBM Support.
To fix CVE-2021-36084 in IBM QRadar SIEM 7.4.3 GA - 7.4.3 FP4, you can apply the patch available from IBM Support.
To fix CVE-2021-36084 in IBM QRadar SIEM 7.3.3 GA - 7.3.3 FP10, you can apply the patch available from IBM Support.