CVE-2026-23241

Source
https://cve.org/CVERecord?id=CVE-2026-23241
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23241.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23241
Downstream
Published
2026-03-17T09:11:04.913Z
Modified
2026-04-14T03:47:33.680992Z
Summary
audit: add missing syscalls to read class
Details

In the Linux kernel, the following vulnerability has been resolved:

audit: add missing syscalls to read class

The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as:

-w /tmp/test -p rwa -k test_rwa

The current patch adds missing syscalls to the audit read class.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23241.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6140be90ec70c39fa844741ca3cc807dd0866394
Fixed
a2e8c144299c31d3972295ed80d4cb908daf4f6f
Fixed
ad37505ce869a8100ff23f24eea117de7a7516bf
Fixed
bcb90a2834c7393c26df9609b889a3097b7700cd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23241.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.16
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23241.json"