{"id":"CVE-2026-23410","summary":"apparmor: fix race on rawdata dereference","details":"In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix race on rawdata dereference\n\nThere is a race condition that leads to a use-after-free situation:\nbecause the rawdata inodes are not refcounted, an attacker can start\nopen()ing one of the rawdata files, and at the same time remove the\nlast reference to this rawdata (by removing the corresponding profile,\nfor example), which frees its struct aa_loaddata; as a result, when\nseq_rawdata_open() is reached, i_private is a dangling pointer and\nfreed memory is accessed.\n\nThe rawdata inodes weren't refcounted to avoid a circular refcount and\nwere supposed to be held by the profile rawdata reference.  However\nduring profile removal there is a window where the vfs and profile\ndestruction race, resulting in the use after free.\n\nFix this by moving to a double refcount scheme. Where the profile\nrefcount on rawdata is used to break the circular dependency. Allowing\nfor freeing of the rawdata once all inode references to the rawdata\nare put.","modified":"2026-04-03T11:03:47.288760Z","published":"2026-04-01T08:36:39.202Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23410.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6ef1f2926c41ab96952d9696d55a052f1b3a9418"},{"type":"WEB","url":"https://git.kernel.org/stable/c/763e838adc3c7ec5a7df2990ce84cad951e42721"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a0b7091c4de45a7325c8780e6934a894f92ac86b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/af782cc8871e3683ddd5a3cd2f7df526599863a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f9761add6d100962a23996cb68f3d6abdd4d1815"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23410.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23410"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"5d5182cae40115c03933989473288e54afb39c7c"},{"fixed":"6ef1f2926c41ab96952d9696d55a052f1b3a9418"},{"fixed":"f9761add6d100962a23996cb68f3d6abdd4d1815"},{"fixed":"af782cc8871e3683ddd5a3cd2f7df526599863a9"},{"fixed":"763e838adc3c7ec5a7df2990ce84cad951e42721"},{"fixed":"a0b7091c4de45a7325c8780e6934a894f92ac86b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23410.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.13.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.77"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.18"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23410.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}