CVE-2011-0006

Priority
Description
The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in
the Linux kernel before 2.6.37, when the Linux Security Modules (LSM)
framework is disabled, allows local users to bypass Integrity Measurement
Architecture (IMA) rules in opportunistic circumstances by leveraging an
administrator's addition of an IMA rule for LSM.
Ubuntu-Description
A flaw was found in the kernel's Integrity Measurement Architecture (IMA).
Changes made by an attacker might not be discovered by IMA, if SELinux was
disabled, and a new IMA rule was loaded.
Notes
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.37)
Patches:
Introduced by
3323eec921efd815178a23107ab63588c605c0b2
Fixed by
867c20265459d30a01b021a9c1e81fb4c5832aa9
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
More Information

Updated: 2019-12-05 20:56:15 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)