Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel up to and including 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |