Impact
This vulnerability involves the apparmor component of the Linux kernel, specifically the verification of differential encoding chains. The bug allowed loops to be created when a differential encode chain was unchecked or incorrectly marked during verification. Because of this flaw, a loop could be introduced in the chain being verified, potentially leading to resource exhaustion or other denial‑of‑service conditions. The weakness is identified as CWE‑372: Incorrect Verification of Data or State.
Affected Systems
Affected systems are Linux kernel installations across all Linux distributions that include the apparmor subsystem. The patch addresses the flaw in the differential encode verification logic and is applicable to all kernel releases prior to the update that contains this fix.
Risk and Exploitability
No CVSS score is provided; however, the EPSS score is reported as less than 1 percent, indicating a very low probability of exploitation in the wild. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog, suggesting no known public exploits. The likely attack vector would require the attacker to influence the Differential Encoding chain within the apparmor policy context; precise conditions are not detailed in the data.
OpenCVE Enrichment
Ubuntu USN