vulnerability
Ubuntu: (CVE-2026-23408): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Apr 1, 2026 | Apr 3, 2026 | Apr 3, 2026 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Apr 1, 2026
Added
Apr 3, 2026
Modified
Apr 3, 2026
Description
In the Linux kernel, the following vulnerability has been resolved:
apparmor: Fix double free of ns_name in aa_replace_profiles()
if ns_name is NULL after
1071 error = aa_unpack(udata, &lh, &ns_name);
and if ent->ns_name contains an ns_name in
1089 } else if (ent->ns_name) {
then ns_name is assigned the ent->ns_name
1095 ns_name = ent->ns_name;
however ent->ns_name is freed at
1262 aa_load_ent_free(ent);
and then again when freeing ns_name at
1270 kfree(ns_name);
Fix this by NULLing out ent->ns_name after it is transferred to ns_name
")
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-15ubuntu-upgrade-linux-aws-6-17ubuntu-upgrade-linux-aws-6-8ubuntu-upgrade-linux-aws-fipsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-6-17ubuntu-upgrade-linux-azure-6-8ubuntu-upgrade-linux-fipsubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-15ubuntu-upgrade-linux-gcp-6-17ubuntu-upgrade-linux-gcp-6-8ubuntu-upgrade-linux-gcp-fipsubuntu-upgrade-linux-gkeubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-hwe-6-17ubuntu-upgrade-linux-hwe-6-8ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-ibm-5-15ubuntu-upgrade-linux-ibm-6-8ubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-lowlatency-hwe-6-8ubuntu-upgrade-linux-nvidiaubuntu-upgrade-linux-nvidia-6-8ubuntu-upgrade-linux-nvidia-lowlatencyubuntu-upgrade-linux-nvidia-tegraubuntu-upgrade-linux-nvidia-tegra-5-15ubuntu-upgrade-linux-nvidia-tegra-igxubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-15ubuntu-upgrade-linux-oracle-6-17ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-raspi-realtimeubuntu-upgrade-linux-realtimeubuntu-upgrade-linux-realtime-6-17ubuntu-upgrade-linux-realtime-6-8ubuntu-upgrade-linux-riscvubuntu-upgrade-linux-riscv-6-17ubuntu-upgrade-linux-riscv-6-8ubuntu-upgrade-linux-xilinx-zynqmp
References
- CVE-2026-23408
- https://attackerkb.com/topics/CVE-2026-23408
- EUVD-EUVD-2026-17837
- https://cdn2.qualys.com/advisory/2026/03/10/crack-armor.txt
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-17837
- https://ubuntu.com/blog/apparmor-vulnerability-fixes-available
- https://ubuntu.com/security/vulnerabilities/crackarmor
- https://www.cve.org/CVERecord?id=CVE-2026-23408
- https://www.openwall.com/lists/oss-security/2026/04/01/3
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.