CVE-2011-0006

Published: 12 January 2012

The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.

From the Ubuntu security team

A flaw was found in the kernel's Integrity Measurement Architecture (IMA). Changes made by an attacker might not be discovered by IMA, if SELinux was disabled, and a new IMA rule was loaded.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
Patches:
Introduced by 3323eec921efd815178a23107ab63588c605c0b2
Fixed by 867c20265459d30a01b021a9c1e81fb4c5832aa9
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.37)