CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
5.1%
Race condition in the audit_log_single_execve_arg function in
kernel/auditsc.c in the Linux kernel through 4.7 allows local users to
bypass intended character-set restrictions or disrupt system-call auditing
by changing a certain string, aka a βdouble fetchβ vulnerability.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
sbeattie | allows corruption of audit logs |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.04 | noarch | linux | <Β 3.2.0-111.153 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | <Β 3.13.0-98.145 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | <Β 4.4.0-38.57 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-armadaxp | <Β 3.2.0-1674.100 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-trusty | <Β 3.13.0-98.145~precise1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-vivid | <Β 3.19.0-71.79~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | <Β 4.4.0-38.57~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | <Β 4.4.0-1023.29 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-snapdragon | <Β 4.4.0-1026.29 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-ti-omap4 | <Β 3.2.0-1489.116 | UNKNOWN |
bugzilla.kernel.org/show_bug.cgi?id=120681
github.com/linux-audit/audit-kernel/issues/18
launchpad.net/bugs/cve/CVE-2016-6136
nvd.nist.gov/vuln/detail/CVE-2016-6136
security-tracker.debian.org/tracker/CVE-2016-6136
ubuntu.com/security/notices/USN-3084-1
ubuntu.com/security/notices/USN-3084-2
ubuntu.com/security/notices/USN-3084-3
ubuntu.com/security/notices/USN-3084-4
ubuntu.com/security/notices/USN-3097-1
ubuntu.com/security/notices/USN-3097-2
ubuntu.com/security/notices/USN-3098-1
ubuntu.com/security/notices/USN-3098-2
www.cve.org/CVERecord?id=CVE-2016-6136
www.redhat.com/archives/linux-audit/2016-June/msg00029.html
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
5.1%