CVE Vulnerabilities

CVE-2011-0006

Published: Jun 21, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
1.9 LOW
AV:L/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
1.5 LOW
AV:L/AC:M/Au:S/C:N/I:P/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrators addition of an IMA rule for LSM.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*2.6.36.4 (including)
Linux_kernelLinux2.6.36.1 (including)2.6.36.1 (including)
Linux_kernelLinux2.6.36.2 (including)2.6.36.2 (including)
Linux_kernelLinux2.6.36.3 (including)2.6.36.3 (including)
Red Hat Enterprise Linux 6RedHatkernel-0:2.6.32-71.29.1.el6*
LinuxUbuntulucid*
LinuxUbuntumaverick*
LinuxUbuntuupstream*
Linux-armadaxpUbuntuupstream*
Linux-ec2Ubuntulucid*
Linux-ec2Ubuntumaverick*
Linux-ec2Ubuntuupstream*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-lts-backport-maverickUbuntulucid*
Linux-lts-backport-maverickUbuntuupstream*
Linux-lts-backport-nattyUbuntuupstream*
Linux-lts-backport-oneiricUbuntuupstream*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntumaverick*
Linux-mvl-doveUbuntuupstream*
Linux-ti-omap4Ubuntumaverick*
Linux-ti-omap4Ubuntuupstream*

References