CVE-2011-0006
Published: 12 January 2012
The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.
From the Ubuntu security team
A flaw was found in the kernel's Integrity Measurement Architecture (IMA). Changes made by an attacker might not be discovered by IMA, if SELinux was disabled, and a new IMA rule was loaded.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
Patches: Introduced by 3323eec921efd815178a23107ab63588c605c0b2 Fixed by 867c20265459d30a01b021a9c1e81fb4c5832aa9 |
||
linux-armadaxp Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
linux-lts-backport-natty Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
linux-lts-backport-oneiric Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.37)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0006
- https://www.redhat.com/archives/rhsa-announce/2011-May/msg00008.html
- https://usn.ubuntu.com/usn/usn-1080-2
- https://usn.ubuntu.com/usn/usn-1080-1
- https://usn.ubuntu.com/usn/usn-1081-1
- https://usn.ubuntu.com/usn/usn-1093-1
- https://usn.ubuntu.com/usn/usn-1394-1
- https://usn.ubuntu.com/usn/usn-1187-1
- NVD
- Launchpad
- Debian