The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmapmatchany (called indirectly from cilcheckneverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-36087.json"
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"183876728326803525112157422922061259076",
"328703148128320516125026399376588448455",
"230199517397306399716978052921782969498",
"107157126862077543187334308996068075640",
"278623980516350987133875061264641603304",
"138805797432491118174522328846959269353",
"23765780684173179429476893236922715404",
"258668949758547995718008952085069003342",
"40760257860715875290445994819802576914",
"17500797260726643034752140199433826600",
"315031663983752927366619564954829350451",
"217226570087870188733606923070308540902",
"288230039647557958093620505757105997768",
"115867961769130697484526047287037186777",
"289354624719398516819854005901076481426",
"110532357990646945187181992736302192494",
"67240094650700800560911208887672828297",
"335145615686817878681572388989083633904",
"110047506702269321875274110479868505762",
"325474028789220868509860897750678498493",
"295351075712559440484127404765040973109"
]
},
"source": "https://github.com/selinuxproject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"target": {
"file": "libsepol/cil/src/cil_build_ast.c"
},
"signature_version": "v1",
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2021-36087-45f34cdd"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"115955176104542041489429664044827038426",
"310906068992919460868187003684802416798",
"118254091501105413129746432958063478925",
"255870215286240865916194537647816361222",
"172108040035898250050347416679765353167"
]
},
"source": "https://github.com/selinuxproject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"target": {
"file": "libsepol/cil/src/cil_resolve_ast.c"
},
"signature_version": "v1",
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2021-36087-60a8260d"
},
{
"digest": {
"length": 14345.0,
"function_hash": "73501039882193824431008554035953756913"
},
"source": "https://github.com/selinuxproject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"target": {
"function": "__cil_build_ast_node_helper",
"file": "libsepol/cil/src/cil_build_ast.c"
},
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2021-36087-af80e84a"
},
{
"digest": {
"length": 477.0,
"function_hash": "128341480309304772726956638765946147682"
},
"source": "https://github.com/selinuxproject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"target": {
"function": "__cil_build_ast_last_child_helper",
"file": "libsepol/cil/src/cil_build_ast.c"
},
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2021-36087-bec13947"
},
{
"digest": {
"length": 2674.0,
"function_hash": "92067899462263966081699937569280415869"
},
"source": "https://github.com/selinuxproject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"target": {
"function": "__cil_resolve_ast_node_helper",
"file": "libsepol/cil/src/cil_resolve_ast.c"
},
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2021-36087-d24cd8eb"
},
{
"digest": {
"length": 516.0,
"function_hash": "292243287020746760833812267338023984744"
},
"source": "https://github.com/selinuxproject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"target": {
"function": "cil_build_ast",
"file": "libsepol/cil/src/cil_build_ast.c"
},
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2021-36087-d5db87c4"
}
]