First published: Thu Jul 01 2021(Updated: )
SELinux Project SELinux is vulnerable to a denial of service, caused by a use-after-free in cil_reset_classpermission . By sending a specially-crafted request, a local attacker could exploit this vulnerability to cause a denial of service condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SELinux Project SELinux | ||
Fedoraproject Fedora | =35 | |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-36086.
The severity of CVE-2021-36086 is medium with a severity value of 6.2.
CVE-2021-36086 affects SELinux Project SELinux by causing a denial of service through a use-after-free in cil_reset_classpermission.
You can fix CVE-2021-36086 for IBM QRadar SIEM version 7.5.0 GA by applying the patch available at this URL: [link].
You can fix CVE-2021-36086 for IBM QRadar SIEM version 7.4.3 GA - 7.4.3 FP4 by applying the patch available at this URL: [link].
You can fix CVE-2021-36086 for IBM QRadar SIEM version 7.3.3 GA - 7.3.3 FP10 by applying the patch available at this URL: [link].
The Common Weakness Enumeration (CWE) ID for CVE-2021-36086 is 416.