-
CVE-2026-23241
- EPSS 0.02%
- Veröffentlicht 17.03.2026 09:11:04
- Zuletzt bearbeitet 18.03.2026 10:16:25
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing syscalls to the audit read class.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a2e8c144299c31d3972295ed80d4cb908daf4f6f
Version
6140be90ec70c39fa844741ca3cc807dd0866394
Status
affected
Version <
ad37505ce869a8100ff23f24eea117de7a7516bf
Version
6140be90ec70c39fa844741ca3cc807dd0866394
Status
affected
Version <
bcb90a2834c7393c26df9609b889a3097b7700cd
Version
6140be90ec70c39fa844741ca3cc807dd0866394
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.13
Status
affected
Version <
6.13
Version
0
Status
unaffected
Version <=
6.18.*
Version
6.18.16
Status
unaffected
Version <=
6.19.*
Version
6.19.6
Status
unaffected
Version <=
*
Version
7.0-rc1
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.061 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|