** Description changed:

- A flaw was found in the Linux kernel's Integrity Measurement
- Architecture (IMA) implementation. When SELinux was disabled, adding an
- IMA rule which was supposed to be processed by SELinux would cause
- ima_match_rules() to always succeed, ignoring any remaining rules.
+ The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in
+ the Linux kernel before 2.6.37, when the Linux Security Modules (LSM)
+ framework is disabled, allows local users to bypass Integrity
+ Measurement Architecture (IMA) rules in opportunistic circumstances by
+ leveraging an administrator's addition of an IMA rule for LSM.
  
  Break-Fix: 3323eec921efd815178a23107ab63588c605c0b2
  867c20265459d30a01b021a9c1e81fb4c5832aa9

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/917808

Title:
  CVE-2011-0006

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917808/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to