![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2016-6136 |
Description: | Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability. |
Test IDs: | 1.3.6.1.4.1.25623.1.1.1.2.2016.609 1.3.6.1.4.1.25623.1.0.703659 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6136 BugTraq ID: 91558 http://www.securityfocus.com/bid/91558 Bugtraq: 20160704 [CVE-2016-6136] Double-Fetch Vulnerability in Linux-4.6/kernel/auditsc.c (Google Search) http://www.securityfocus.com/archive/1/538835/30/0/threaded RedHat Security Advisories: RHSA-2016:2574 http://rhn.redhat.com/errata/RHSA-2016-2574.html RedHat Security Advisories: RHSA-2016:2584 http://rhn.redhat.com/errata/RHSA-2016-2584.html RedHat Security Advisories: RHSA-2017:0307 http://rhn.redhat.com/errata/RHSA-2017-0307.html |