SB2026040153 - Race condition in Linux kernel apparmor
Published: April 1, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2026-23411)
The vulnerability allows a local attacker to cause a denial of service.
The vulnerability exists due to a race condition in the AppArmor i_private data management when accessing filesystem callback functions after reference removal. A local attacker can trigger a use-after-free condition by exploiting the race between freeing data and filesystem access to trigger a denial of service.
The issue arises when the inode persists beyond AppArmor data cleanup and filesystem callbacks are invoked after the reference has been released. This race condition primarily affects data stored in i_private, including rawdata/loaddata interfaces.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/13bc2772414d68e94e273dea013181a986948ddf
- https://git.kernel.org/stable/c/2a732ed26fbd048e7925d227af8cf9ea43fb5cc9
- https://git.kernel.org/stable/c/8e135b8aee5a06c52a4347a5a6d51223c6f36ba3
- https://git.kernel.org/stable/c/ae10787d955fb255d381e0d5589451dd72c614b1
- https://git.kernel.org/stable/c/eecce026399917f6efa532c56bc7a3e9dd6ee68b