Known Vulnerabilities for Selinux by Selinux Project
Listed below are 7 of the newest known vulnerabilities associated with "Selinux" by "Selinux Project".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-35376 json | A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the chcon utility of uutils coreutils during recursive operat... | Not Provided | 2026-04-22 | 2026-04-22 |
| CVE-2026-35361 json | The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the ... | Not Provided | 2026-04-22 | 2026-04-22 |
| CVE-2026-35354 json | A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the mv utility of uutils coreutils during cross-device moves.... | Not Provided | 2026-04-22 | 2026-04-22 |
| CVE-2021-36087 json | The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neve... | 3.3 - LOW | 2021-07-01 | 2023-11-07 |
| CVE-2021-36086 json | The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and c... | 3.3 - LOW | 2021-07-01 | 2023-11-07 |
| CVE-2021-36085 json | The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and... | 3.3 - LOW | 2021-07-01 | 2023-11-07 |
| CVE-2021-36084 json | The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and... | 3.3 - LOW | 2021-07-01 | 2023-11-07 |
| CVE-2018-1063 json | Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to c... | 4.4 - MEDIUM | 2018-03-02 | 2023-11-07 |
| CVE-2016-7545 json | SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl c... | 8.8 - HIGH | 2017-01-19 | 2023-11-07 |
| CVE-2015-3170 json | selinux-policy when sysctl fs.protected_hardlinks are set to 0 allows local users to cause a denial of service (SSH login pre... | 5.5 - MEDIUM | 2017-07-21 | 2017-07-26 |
Known Affected Configurations (CPE V2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Selinux Project | Selinux | - |