[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-6136Date: (C)2016-08-25   (M)2024-04-19


Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 4.7CVSS Score : 1.9
Exploit Score: 1.0Exploit Score: 3.4
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: NONEAvailability: NONE
Integrity: HIGH 
Availability: NONE 
  
Reference:
http://www.securityfocus.com/archive/1/538835/30/0/threaded
BID-91558
RHSA-2016:2574
RHSA-2016:2584
RHSA-2017:0307
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=43761473c254b45883a64441dd0bc85a42f3645c
https://bugzilla.kernel.org/show_bug.cgi?id=120681
https://bugzilla.redhat.com/show_bug.cgi?id=1353533
https://github.com/linux-audit/audit-kernel/issues/18
https://github.com/torvalds/linux/commit/43761473c254b45883a64441dd0bc85a42f3645c
https://source.android.com/security/bulletin/2016-11-01.html

CPE    1
cpe:/o:linux:linux_kernel
CWE    1
CWE-362
OVAL    28
oval:org.secpod.oval:def:703272
oval:org.secpod.oval:def:703311
oval:org.secpod.oval:def:111178
oval:org.secpod.oval:def:1501675
...

© SecPod Technologies