-
CVE-2026-23241
- EPSS 0.03%
- Veröffentlicht 17.03.2026 09:11:04
- Zuletzt bearbeitet 18.03.2026 10:16:25
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
audit: add missing syscalls to read class
In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing syscalls to the audit read class.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
6140be90ec70c39fa844741ca3cc807dd0866394
Version <
a2e8c144299c31d3972295ed80d4cb908daf4f6f
Status
affected
Version
6140be90ec70c39fa844741ca3cc807dd0866394
Version <
ad37505ce869a8100ff23f24eea117de7a7516bf
Status
affected
Version
6140be90ec70c39fa844741ca3cc807dd0866394
Version <
bcb90a2834c7393c26df9609b889a3097b7700cd
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.13
Status
affected
Version
0
Version <
6.13
Status
unaffected
Version <=
6.18.*
Version
6.18.16
Status
unaffected
Version <=
6.19.*
Version
6.19.6
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.071 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|