{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "b7fd2c0340eacbee892425e9007647568b7f2a3c"
            },
            {
              "fixed": "17debf5586020790b5717f96e5e6a3ca5bb961ab"
            },
            {
              "fixed": "0fc63dd9170643d15c25681fca792539e23f4640"
            },
            {
              "fixed": "b60b3f7a35c46b2e0ca934f9c988b8fca06d76c6"
            },
            {
              "fixed": "b6a94eeca9c6c8f7c55ad44c62c98324f51ec596"
            },
            {
              "fixed": "6601e13e82841879406bf9f369032656f441a425"
            }
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "type": "GIT"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Linux",
        "name": "Kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "4.11.0"
            },
            {
              "fixed": "6.6.130"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.7.0"
            },
            {
              "fixed": "6.12.77"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.13.0"
            },
            {
              "fixed": "6.18.18"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.19.0"
            },
            {
              "fixed": "6.19.8"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "database_specific": {
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23268.json"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix unprivileged local user can do privileged policy management\n\nAn unprivileged local user can load, replace, and remove profiles by\nopening the apparmorfs interfaces, via a confused deputy attack, by\npassing the opened fd to a privileged process, and getting the\nprivileged process to write to the interface.\n\nThis does require a privileged target that can be manipulated to do\nthe write for the unprivileged process, but once such access is\nachieved full policy management is possible and all the possible\nimplications that implies: removing confinement, DoS of system or\ntarget applications by denying all execution, by-passing the\nunprivileged user namespace restriction, to exploiting kernel bugs for\na local privilege escalation.\n\nThe policy management interface can not have its permissions simply\nchanged from 0666 to 0600 because non-root processes need to be able\nto load policy to different policy namespaces.\n\nInstead ensure the task writing the interface has privileges that\nare a subset of the task that opened the interface. This is already\ndone via policy for confined processes, but unconfined can delegate\naccess to the opened fd, by-passing the usual policy check.",
  "id": "CVE-2026-23268",
  "modified": "2026-04-01T23:09:22.271564220Z",
  "published": "2026-03-18T17:54:41.974Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/0fc63dd9170643d15c25681fca792539e23f4640"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/17debf5586020790b5717f96e5e6a3ca5bb961ab"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/6601e13e82841879406bf9f369032656f441a425"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/b60b3f7a35c46b2e0ca934f9c988b8fca06d76c6"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/b6a94eeca9c6c8f7c55ad44c62c98324f51ec596"
    },
    {
      "type": "WEB",
      "url": "https://www.qualys.com/2026/03/10/crack-armor.txt"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23268.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23268"
    },
    {
      "type": "PACKAGE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"
    }
  ],
  "schema_version": "1.7.3",
  "summary": "apparmor: fix unprivileged local user can do privileged policy management"
}