VYPR
Medium severity5.5NVD Advisory· Published Apr 1, 2026· Updated Apr 24, 2026

CVE-2026-23405

CVE-2026-23405

Description

In the Linux kernel, the following vulnerability has been resolved:

apparmor: fix: limit the number of levels of policy namespaces

Currently the number of policy namespaces is not bounded relying on the user namespace limit. However policy namespaces aren't strictly tied to user namespaces and it is possible to create them and nest them arbitrarily deep which can be used to exhaust system resource.

Hard cap policy namespaces to the same depth as user namespaces.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel AppArmor lacked a depth limit on policy namespaces, allowing local users to exhaust system resources via nested namespace creation.

Vulnerability

In the Linux kernel's AppArmor security module, the number of nested policy namespaces was not bounded. Unlike user namespaces, which have a hard limit on nesting depth, AppArmor policy namespaces could be created and nested arbitrarily deep, relying only on the user namespace limit which is not strictly tied to AppArmor namespaces. This oversight allows an attacker to exhaust system resources by creating deeply nested policy namespaces.

Exploitation

A local user with the ability to create AppArmor namespaces (typically requiring CAP_MAC_ADMIN or similar privileges) can exploit this by repeatedly nesting namespaces. No network access or authentication beyond local system access is required. The attack does not depend on any other vulnerability; it is a direct resource exhaustion vector.

Impact

An attacker can cause significant memory and possibly CPU exhaustion, leading to a denial of service (DoS) condition on the affected system. The unbounded nesting consumes kernel memory for each namespace level, potentially crashing the system or making it unresponsive.

Mitigation

The fix introduces a hard cap on the depth of AppArmor policy namespaces, matching the existing limit for user namespaces. Patches have been backported to stable kernel versions [1][2][3][4]. Users should apply the latest kernel updates from their distribution to remediate this issue.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10
  • Linux/Kernel10 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=2.6.36.1,<5.10.253
    • cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.