libsepol is vulnerable to use after free. The vulnerability exists due to a lack of setting the set field of cil_reset_classpermission to NULL instead of resetting the classpermission when freeing the pointer.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/
access.redhat.com/errata/RHSA-2021:4513
access.redhat.com/security/updates/classification/#moderate
bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
bugzilla.redhat.com/show_bug.cgi?id=1979662
github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
lists.fedoraproject.org/archives/list/[email protected]/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/