Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-609-1 | linux security update |
Debian DSA |
DSA-3659-1 | linux security update |
EUVD |
EUVD-2016-7070 | Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability. |
Ubuntu USN |
USN-3084-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3084-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3084-3 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Ubuntu USN |
USN-3084-4 | Linux kernel (Qualcomm Snapdragon) vulnerabilities |
Ubuntu USN |
USN-3097-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3097-2 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-3098-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3098-2 | Linux kernel (Trusty HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:22:19.887Z
Reserved: 2016-07-01T00:00:00
Link: CVE-2016-6136
No data.
Status : Deferred
Published: 2016-08-06T20:59:06.800
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-6136
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN