Логотип exploitDog
bind:CVE-2026-23241
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23241

Количество 6

Количество 6

ubuntu логотип

CVE-2026-23241

11 дней назад

[audit: add missing syscalls to read class]

EPSS: Низкий
redhat логотип

CVE-2026-23241

11 дней назад

No description is available for this CVE.

CVSS3: 5.1
EPSS: Низкий
nvd логотип

CVE-2026-23241

10 дней назад

In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing syscalls to the audit read class.

EPSS: Низкий
msrc логотип

CVE-2026-23241

10 дней назад

audit: add missing syscalls to read class

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2026-23241

10 дней назад

In the Linux kernel, the following vulnerability has been resolved: a ...

EPSS: Низкий
github логотип

GHSA-c2fm-fx6j-95j7

10 дней назад

In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing syscalls to the audit read class.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-23241

[audit: add missing syscalls to read class]

0%
Низкий
11 дней назад
redhat логотип
CVE-2026-23241

No description is available for this CVE.

CVSS3: 5.1
0%
Низкий
11 дней назад
nvd логотип
CVE-2026-23241

In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing syscalls to the audit read class.

0%
Низкий
10 дней назад
msrc логотип
CVE-2026-23241

audit: add missing syscalls to read class

CVSS3: 5.5
0%
Низкий
10 дней назад
debian логотип
CVE-2026-23241

In the Linux kernel, the following vulnerability has been resolved: a ...

0%
Низкий
10 дней назад
github логотип
GHSA-c2fm-fx6j-95j7

In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing syscalls to the audit read class.

0%
Низкий
10 дней назад

Уязвимостей на страницу