CVE-2016-6136 PUBLISHED

Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.

EPSS 0.02% · 5.6th percentile

Risk Scores

EPSS Score
0.02%
5.6th percentile

Affected Products

VendorProductVersions
Ubuntu:24.04:LTSlinux-hwe-6.116.11.0-28.28~24.04.1, 6.11.0-26.26~24.04.1, 6.11.0-25.25~24.04.1
Ubuntu:18.04:LTSlinux-hwe-edge5.3.0-23.25~18.04.2, 0, 5.3.0-24.26~18.04.2
Ubuntu:14.04:LTSlinux3.13.0-8.28, 3.13.0-10.30, 3.13.0-11.31
Ubuntu:24.04:LTSlinux-azure-6.116.11.0-1014.14~24.04.1, 6.11.0-1013.13~24.04.1, 6.11.0-1012.12~24.04.1
Ubuntu:24.04:LTSlinux-gcp-6.110, 6.11.0-1006.6~24.04.2, 6.11.0-1011.11~24.04.1
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1088.97~20.04.1.1, 0, 5.15.0-1019.24~20.04.1.1
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1013.15, 0, 4.4.0-1022.25
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:16.04:LTSlinux-raspi20, 4.4.0-1016.22, 4.4.0-1017.23
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:22.04:LTSlinux-realtime0, 5.15.0-1032.35
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-22.39~14.04.1, 4.4.0-21.37~14.04.1, 4.4.0-18.34~14.04.1
Ubuntu:24.04:LTSlinux-riscv6.8.0-52.53.1, 6.8.0-51.52.1, 6.8.0-50.51.1
Ubuntu:20.04:LTSlinux-raspi20, 5.3.0-1007.8, 5.3.0-1014.16
Ubuntu:18.04:LTSlinux-azure5.0.0-1032.34, 0, 4.15.0-1002.2
Ubuntu:14.04:LTSlinux-lts-vivid3.19.0-59.65~14.04.1, 3.19.0-58.64~14.04.1, 3.19.0-56.62~14.04.1
Ubuntu:20.04:LTSlinux-riscv5.4.0-27.31, 5.4.0-30.34, 5.4.0-31.35
Ubuntu:24.04:LTSlinux-realtime6.8.1-1015.16, 0
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1090.95+cvm1.1, 5.4.0-1091.96+cvm1.1, 5.4.0-1092.97+cvm1.1
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.116.11.0-1011.12~24.04.1, 6.11.0-1012.13~24.04.1, 6.11.0-1013.14~24.04.1

…and 6 more

Timeline

References

Open in Interactive Console →