CVE-2011-0006 (retired)

Priority
Description
The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in
the Linux kernel before 2.6.37, when the Linux Security Modules (LSM)
framework is disabled, allows local users to bypass Integrity Measurement
Architecture (IMA) rules in opportunistic circumstances by leveraging an
administrator's addition of an IMA rule for LSM.
Ubuntu-Description
A flaw was found in the kernel's Integrity Measurement Architecture (IMA).
Changes made by an attacker might not be discovered by IMA, if SELinux was
disabled, and a new IMA rule was loaded.
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.37)
Patches:
Introduced by 3323eec921efd815178a23107ab63588c605c0b2Fixed by 867c20265459d30a01b021a9c1e81fb4c5832aa9
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
Package
Upstream:released (2.6.37)
More Information

Updated: 2019-03-26 11:54:39 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)