CVE-2011-0006

LOW

Description

The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.

References

http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=867c20265459d30a01b021a9c1e81fb4c5832aa9

http://www.openwall.com/lists/oss-security/2011/01/06/18

https://bugzilla.redhat.com/show_bug.cgi?id=667912

https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9

Details

Source: MITRE

Published: 2012-06-21

Updated: 2012-06-26

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 1.9

Vector: (AV:L/AC:M/Au:N/C:N/I:P/A:N)

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW