** Description changed: - A flaw was found in the Linux kernel's Integrity Measurement - Architecture (IMA) implementation. When SELinux was disabled, adding an - IMA rule which was supposed to be processed by SELinux would cause - ima_match_rules() to always succeed, ignoring any remaining rules. + The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in + the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) + framework is disabled, allows local users to bypass Integrity + Measurement Architecture (IMA) rules in opportunistic circumstances by + leveraging an administrator's addition of an IMA rule for LSM. Break-Fix: 3323eec921efd815178a23107ab63588c605c0b2 867c20265459d30a01b021a9c1e81fb4c5832aa9
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/917808 Title: CVE-2011-0006 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917808/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
