Double Fetch Vulnerability in Linux Kernel's audit_log_single_execve_arg Function

Double Fetch Vulnerability in Linux Kernel's audit_log_single_execve_arg Function

CVE-2016-6136 · LOW Severity

AV:L/AC:M/AU:N/C:N/I:P/A:N

Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.