Description
In the Linux kernel, the following vulnerability has been resolved:

audit: add missing syscalls to read class

The "at" variant of getxattr() and listxattr() are missing from the
audit read class. Calling getxattrat() or listxattrat() on a file to
read its extended attributes will bypass audit rules such as:

-w /tmp/test -p rwa -k test_rwa

The current patch adds missing syscalls to the audit read class.
Published: 2026-03-17
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Audit Bypass
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises because the audit subsystem in the Linux kernel omitted the at variants of getxattr() and listxattr() from its read class. As a result, calls to getxattrat() or listxattrat() on files allow extended attributes to be read without triggering audit rules that would normally flag such operations. This missing audit entry enables an attacker to read file metadata stealthily, potentially leading to information disclosure or aiding in lateral movement. The weakness corresponds to improper handling of audit logging, which is a form of missing or ineffective access control and monitoring.

Affected Systems

Affected systems are Linux kernel deployments where the audit subsystem does not yet include the missing syscalls in its read class. Specific version information was not provided; therefore the issue applies to any kernel version prior to the patch that adds getxattrat() and listxattrat() to the audit read class. The impacted product can be identified by the CPE string cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score and EPSS exploration values are not provided in the data, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likelihood of exploitation is moderate; an attacker would need local or privileged code execution to invoke the affected system calls, but no exploit code or proof‑of‑concept is referenced. The primary risk is that audit logs will not capture certain read operations, weakening overall system observability. The official fix is to apply the kernel patch that incorporates the missing syscalls into the audit read class.

Generated by OpenCVE AI on March 17, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the audit read class patch which adds getxattrat() and listxattrat() to the audit read class.

Generated by OpenCVE AI on March 17, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 10:30:00 +0000


Wed, 18 Mar 2026 00:15:00 +0000


Tue, 17 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing syscalls to the audit read class.
Title audit: add missing syscalls to read class
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:02:57.643Z

Reserved: 2026-01-13T15:37:45.989Z

Link: CVE-2026-23241

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-17T10:16:00.127

Modified: 2026-03-18T10:16:25.173

Link: CVE-2026-23241

cve-icon Redhat

Severity :

Publid Date: 2026-03-17T00:00:00Z

Links: CVE-2026-23241 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:26Z

Weaknesses

No weakness.