CVE-2026-23403
Published: April 4, 2026Last modified: April 9, 2026
Description
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix memory leak in verify_header The function sets `*ns = NULL` on every call, leaking the namespace string allocated in previous iterations when multiple profiles are unpacked. This also breaks namespace consistency checking since *ns is always NULL when the comparison is made. Remove the incorrect assignment. The caller (aa_unpack) initializes *ns to NULL once before the loop, which is sufficient.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.5 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Vulnerable (6.1.164-r0) |
| 25 LTS | linux-lts | Fixed (6.12.80-r0) | |
| Stream | linux-lts | Fixed (6.12.80-r0) |
References
- https://git.kernel.org/stable/c/42fd831abfc15d0643c14688f0522556b347e7e6
- https://git.kernel.org/stable/c/4f0889f2df1ab99224a5e1ac4e20437eea5fe38e
- https://git.kernel.org/stable/c/663ce34786e759ebcbeb3060685c20bcc886d51a
- https://git.kernel.org/stable/c/6b79abcb3c985e153fcf9d395e1d4336081aabc2
- https://git.kernel.org/stable/c/786e2c2a87d9c505f33321d1fd23a176aa8ddeb1
- https://git.kernel.org/stable/c/9d678eb0fe55c9195d9a253e8c5b82a87b930737
- https://git.kernel.org/stable/c/bcf82c0c5a8b383fd2d5d8f3fd880cdcab2ac557
- https://git.kernel.org/stable/c/e38c55d9f834e5b848bfed0f5c586aaf45acb825