CVE-2026-23410
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-362
Ejecución concurrente utilizando recursos compartidos con una incorrecta sincronización (Condición de carrera)
Fecha de publicación:
01/04/2026
Última modificación:
24/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
apparmor: fix race on rawdata dereference<br />
<br />
There is a race condition that leads to a use-after-free situation:<br />
because the rawdata inodes are not refcounted, an attacker can start<br />
open()ing one of the rawdata files, and at the same time remove the<br />
last reference to this rawdata (by removing the corresponding profile,<br />
for example), which frees its struct aa_loaddata; as a result, when<br />
seq_rawdata_open() is reached, i_private is a dangling pointer and<br />
freed memory is accessed.<br />
<br />
The rawdata inodes weren&#39;t refcounted to avoid a circular refcount and<br />
were supposed to be held by the profile rawdata reference. However<br />
during profile removal there is a window where the vfs and profile<br />
destruction race, resulting in the use after free.<br />
<br />
Fix this by moving to a double refcount scheme. Where the profile<br />
refcount on rawdata is used to break the circular dependency. Allowing<br />
for freeing of the rawdata once all inode references to the rawdata<br />
are put.
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.13.1 (incluyendo) | 5.10.253 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.203 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.169 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.130 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.77 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.18 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.8 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:4.13:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/3b8e77c7abab40e6de9ad9de730d77984a498840
- https://git.kernel.org/stable/c/6b6ba87579c7e7c669e0bec91823e7fb693bc5df
- https://git.kernel.org/stable/c/6ef1f2926c41ab96952d9696d55a052f1b3a9418
- https://git.kernel.org/stable/c/763e838adc3c7ec5a7df2990ce84cad951e42721
- https://git.kernel.org/stable/c/a0b7091c4de45a7325c8780e6934a894f92ac86b
- https://git.kernel.org/stable/c/af782cc8871e3683ddd5a3cd2f7df526599863a9
- https://git.kernel.org/stable/c/d9d8560b9b7932f8cffc4c068c14289220900f79
- https://git.kernel.org/stable/c/f9761add6d100962a23996cb68f3d6abdd4d1815



