Описание
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
Меры по смягчению последствий
This syscall can still be audited by using the 'syscall auditing feature' by passing open_by_handle_at to it in the rule. Existing auditing ruleset requirements generally use this mechanism.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Out of support scope | ||
Red Hat Enterprise Linux 6 | kernel | Out of support scope | ||
Red Hat Enterprise Linux 7 | kernel | Fix deferred | ||
Red Hat Enterprise Linux 7 | kernel-alt | Out of support scope | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fix deferred | ||
Red Hat Enterprise Linux 8 | kernel | Fix deferred | ||
Red Hat Enterprise Linux 8 | kernel-rt | Fix deferred | ||
Red Hat Enterprise Linux 9 | kernel | Fix deferred |
Показывать по
Дополнительная информация
Статус:
EPSS
3.4 Low
CVSS3
Связанные уязвимости
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
A flaw was found in the Linux kernels implementation of audit rules, w ...
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
EPSS
3.4 Low
CVSS3