In the Linux kernel, the following vulnerability has been resolved:
audit: add missing syscalls to read class
The "at" variant of getxattr() and listxattr() are missing from the
audit read class. Calling getxattrat() or listxattrat() on a file to
read its extended attributes will bypass audit rules such as:
-w /tmp/test -p rwa -k test_rwa
The current patch adds missing syscalls to the audit read class.
CVSS
No CVSS.
References
Configurations
No configuration.
History
18 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
17 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 10:16
Updated : 2026-03-18 10:16
NVD link : CVE-2026-23241
Mitre link : CVE-2026-23241
CVE.ORG link : CVE-2026-23241
JSON object : View
Products Affected
No product.
CWE
No CWE.
