CVE-2026-23408

In the Linux kernel, the following vulnerability has been resolved: apparmor: Fix double free of ns_name in aa_replace_profiles() if ns_name is NULL after 1071 error = aa_unpack(udata, &lh, &ns_name); and if ent->ns_name contains an ns_name in 1089 } else if (ent->ns_name) { then ns_name is assigned the ent->ns_name 1095 ns_name = ent->ns_name; however ent->ns_name is freed at 1262 aa_load_ent_free(ent); and then again when freeing ns_name at 1270 kfree(ns_name); Fix this by NULLing out ent->ns_name after it is transferred to ns_name ")
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

24 Apr 2026, 15:24

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE CWE-415
References () https://git.kernel.org/stable/c/18b5233e860c294a847ee07869d93c0b8673a54b - () https://git.kernel.org/stable/c/18b5233e860c294a847ee07869d93c0b8673a54b - Patch
References () https://git.kernel.org/stable/c/35f4caec1352054b9a61cfdf2bf1898073637aa0 - () https://git.kernel.org/stable/c/35f4caec1352054b9a61cfdf2bf1898073637aa0 - Patch
References () https://git.kernel.org/stable/c/55ef2af7490aaf72f8ffe11ec44c6bcb7eb2162a - () https://git.kernel.org/stable/c/55ef2af7490aaf72f8ffe11ec44c6bcb7eb2162a - Patch
References () https://git.kernel.org/stable/c/5df0c44e8f5f619d3beb871207aded7c78414502 - () https://git.kernel.org/stable/c/5df0c44e8f5f619d3beb871207aded7c78414502 - Patch
References () https://git.kernel.org/stable/c/7998ab3010d2317643f91828f1853d954ef31387 - () https://git.kernel.org/stable/c/7998ab3010d2317643f91828f1853d954ef31387 - Patch
References () https://git.kernel.org/stable/c/86feeccd6b93ed94bd6655f30de80f163f8d5a45 - () https://git.kernel.org/stable/c/86feeccd6b93ed94bd6655f30de80f163f8d5a45 - Patch
References () https://git.kernel.org/stable/c/c053ae381ce227577567d1ef10090ce7506d7a28 - () https://git.kernel.org/stable/c/c053ae381ce227577567d1ef10090ce7506d7a28 - Patch
References () https://git.kernel.org/stable/c/c6347a2116ecccb8fd9ee4ebc75ae41d1d7ef689 - () https://git.kernel.org/stable/c/c6347a2116ecccb8fd9ee4ebc75ae41d1d7ef689 - Patch
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*

18 Apr 2026, 09:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/35f4caec1352054b9a61cfdf2bf1898073637aa0 -
  • () https://git.kernel.org/stable/c/c053ae381ce227577567d1ef10090ce7506d7a28 -
  • () https://git.kernel.org/stable/c/c6347a2116ecccb8fd9ee4ebc75ae41d1d7ef689 -

02 Apr 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

01 Apr 2026, 09:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 09:16

Updated : 2026-04-24 15:24


NVD link : CVE-2026-23408

Mitre link : CVE-2026-23408

CVE.ORG link : CVE-2026-23408


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free