Описание
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
Ссылки
- Issue TrackingPatch
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Issue Tracking
- Issue TrackingPatch
- Issue TrackingPatch
- Issue TrackingPatch
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Issue Tracking
- Issue TrackingPatch
Уязвимые конфигурации
EPSS
4.7 Medium
CVSS3
1.9 Low
CVSS2
Дефекты
Связанные уязвимости
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
Race condition in the audit_log_single_execve_arg function in kernel/a ...
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
ELSA-2017-0307: kernel security and bug fix update (MODERATE)
EPSS
4.7 Medium
CVSS3
1.9 Low
CVSS2