Description
The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-0033 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM. |
Ubuntu USN |
USN-1080-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1080-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1081-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1093-1 | Linux Kernel vulnerabilities (Marvell Dove) |
Ubuntu USN |
USN-1187-1 | Linux kernel (Maverick backport) vulnerabilities |
Ubuntu USN |
USN-1394-1 | linux-ti-omap4 vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T21:36:02.443Z
Reserved: 2010-12-07T00:00:00.000Z
Link: CVE-2011-0006
No data.
Status : Modified
Published: 2012-06-21T23:55:01.787
Modified: 2026-04-29T01:13:23.040
Link: CVE-2011-0006
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN