Double Fetch Vulnerability in Linux Kernel's audit_log_single_execve_arg Function
CVE-2016-6136 · LOW Severity
AV:L/AC:M/AU:N/C:N/I:P/A:N
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
Learn more about our Cis Benchmark Audit For Distribution Independent Linux.