Impact
A race condition exists in the AppArmor subsystem of the Linux kernel where a reference to inode private data is cleared before related filesystem callbacks execute. The freed data may be accessed by these callbacks, causing the kernel to read or write freed memory. If an attacker can orchestrate the timing of these operations, the race can lead to a kernel panic, denial of service, or, in the worst case, a privilege‑escalation scenario through memory corruption.
Affected Systems
All Linux kernel releases prior to the applied security fix are affected. The vulnerability is present in standard Linux distributions and any custom kernels that include the flawed AppArmor code paths. Specific affected kernel versions are not listed, so any kernel before the upstream patch should be considered vulnerable.
Risk and Exploitability
The vulnerability scores a CVSS of 7.8, indicating high severity. EPSS is below 1%, suggesting a low probability of exploitation in the wild. It is not included in the CISA KEV catalog, further indicating limited active exploitation. The likely attack vector involves manipulating AppArmor policies or privileged system calls to trigger the race; however, the exact prerequisites are not detailed in the advisory and are inferred from the nature of the race condition.
OpenCVE Enrichment
Ubuntu USN