The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-0033 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM. |
Ubuntu USN |
USN-1080-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1080-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1081-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1093-1 | Linux Kernel vulnerabilities (Marvell Dove) |
Ubuntu USN |
USN-1187-1 | Linux kernel (Maverick backport) vulnerabilities |
Ubuntu USN |
USN-1394-1 | linux-ti-omap4 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T21:36:02.443Z
Reserved: 2010-12-07T00:00:00Z
Link: CVE-2011-0006
No data.
Status : Deferred
Published: 2012-06-21T23:55:01.787
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-0006
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN