First published: Thu Jul 01 2021(Updated: )
SELinux Project SELinux is vulnerable to a denial of service, caused by a heap-based buffer over-read in ebitmap_match_any. By sending a specially-crafted request, a local attacker could exploit this vulnerability to cause a denial of service condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SELinux Project SELinux | =3.2 | |
Fedoraproject Fedora | =35 | |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-36087.
The severity of CVE-2021-36087 is medium.
The affected software for CVE-2021-36087 is IBM QRadar SIEM version 7.5.0 GA, 7.4.3 GA - 7.4.3 FP4, and 7.3.3 GA - 7.3.3 FP10.
You can fix CVE-2021-36087 by applying the patch provided by IBM. Please refer to the links in the references section for the patches.
You can find more information about CVE-2021-36087 at the IBM X-Force Exchange and the IBM Support page. Please refer to the links in the references section.