Back to bug 2106830

Who When What Removed Added
Marian Rehak 2022-07-13 15:35:13 UTC CC security-response-team
Marian Rehak 2022-07-13 15:35:28 UTC Blocks 2106831
Red Hat Bugzilla 2022-07-16 03:20:23 UTC CC brdeoliv
Wade Mealing 2022-11-07 04:38:10 UTC Deadline 2022-07-19
Group qe_staff, security
Summary EMBARGOED CVE-2022-21505 kernel: lockdown bypass using IMA CVE-2022-21505 kernel: lockdown bypass using IMA
CC brdeoliv, debarbos, ezulian, kernel-mgr, lleshchi
Wade Mealing 2022-11-07 04:54:48 UTC Depends On 2140526
Wade Mealing 2022-11-07 04:58:11 UTC Depends On 2140527, 2140528, 2140529, 2140530
Red Hat Bugzilla 2022-12-31 23:34:43 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:39:44 UTC CC dhoward
errata-xmlrpc 2023-05-09 07:11:25 UTC Link ID Red Hat Product Errata RHSA-2023:2148
errata-xmlrpc 2023-05-09 07:50:21 UTC Link ID Red Hat Product Errata RHSA-2023:2458
Product Security DevOps Team 2023-05-09 15:47:28 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2023-05-09 15:47:28 UTC
Alex 2023-08-13 19:13:38 UTC Doc Text A flaw authentication bypass in the Linux kernel IMA policy when user performs lock down.
A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
RaTasha Tillery-Smith 2023-08-14 14:15:59 UTC Doc Text A flaw authentication bypass in the Linux kernel IMA policy when user performs lock down.
A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
An authentication bypass flaw was found in the Linux kernel’s IMA policy when a user performs lockdown. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Back to bug 2106830