Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
References
Configurations
History
No history.
Information
Published : 2016-08-06 20:59
Updated : 2018-01-05 02:31
NVD link : CVE-2016-6136
Mitre link : CVE-2016-6136
CVE.ORG link : CVE-2016-6136
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')