Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux AppArmor Vulnerabilities Risk Root Escalation

Linux AppArmor Vulnerabilities Risk Root Escalation

Posted on March 13, 2026 By CWS

Cybersecurity experts have identified significant security issues within the Linux kernel’s AppArmor module. These vulnerabilities, which have been present since 2017, allow unprivileged users to bypass kernel protections, escalate privileges to root, and compromise container isolation. The vulnerabilities have been dubbed ‘CrackArmor’ by the Qualys Threat Research Unit (TRU), although they currently lack CVE identifiers.

Understanding the AppArmor Module

AppArmor is a security module in Linux that enforces mandatory access control (MAC) to protect the operating system against various threats by preventing the exploitation of application vulnerabilities. It has been a part of the mainline Linux kernel since version 2.6.36. The recent findings highlight a ‘confused deputy’ flaw where users can exploit pseudo-files to manipulate security profiles, bypass user-namespace restrictions, and execute arbitrary kernel code.

Details of the CrackArmor Vulnerabilities

The vulnerabilities enable local privilege escalation to root, facilitated by complex interactions with tools like Sudo and Postfix. They also pose risks of denial-of-service attacks through stack exhaustion and the bypassing of Kernel Address Space Layout Randomization (KASLR) via out-of-bounds reads. These vulnerabilities exploit the trust associated with privileged tools to perform unauthorized, malicious actions.

Qualys warned that unauthorized users could manipulate AppArmor profiles to disable critical service protections or enforce deny-all policies, triggering DoS attacks. By exploiting kernel-level flaws in profile parsing, attackers can bypass user-namespace restrictions, leading to local privilege escalation (LPE) to full root access.

Implications and Recommendations

The CrackArmor vulnerabilities compromise entire host systems, allowing for advanced exploits such as arbitrary memory disclosure and credential tampering. They also undermine critical security guarantees, including container isolation and service hardening. Qualys has decided to withhold proof-of-concept (PoC) exploits to allow users time to prioritize patching efforts.

These vulnerabilities impact all Linux kernels since version 4.11 on distributions using AppArmor, affecting over 12.6 million enterprise Linux instances. Major distributions like Ubuntu, Debian, and SUSE are particularly vulnerable, and immediate kernel patching is strongly recommended to mitigate these risks effectively.

As per Saeed Abbasi from Qualys, interim mitigation measures do not offer the same level of security assurance as applying vendor-fixed code paths. Therefore, addressing these vulnerabilities through immediate patching is essential to neutralize potential threats.

The Hacker News Tags:AppArmor, container isolation, CrackArmor, cyber threats, Cybersecurity, kernel security, Linux, Qualys, root escalation, Vulnerabilities

Post navigation

Previous Post: Critical Security Update Addresses Veeam RCE Vulnerabilities
Next Post: Google Awards $17 Million in 2025 Bug Bounty Payouts

Related Posts

Cyber Threats: Key Updates on Malware, Privacy, and Security Cyber Threats: Key Updates on Malware, Privacy, and Security The Hacker News
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services The Hacker News
Cloud Password Managers Face Security Challenges Cloud Password Managers Face Security Challenges The Hacker News
How VexTrio and Affiliates Run a Global Scam Network How VexTrio and Affiliates Run a Global Scam Network The Hacker News
Salesforce Experience Cloud Faces Security Threats Salesforce Experience Cloud Faces Security Threats The Hacker News
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Affiliated Cyberattack Disrupts Stryker’s Operations
  • New ClickFix Variant Exploits Network Drives
  • Humata Health Enhances Security with AccuKnox Partnership
  • Iran-Linked Cyber Attacks Threaten US Amidst Ongoing Conflict
  • Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Affiliated Cyberattack Disrupts Stryker’s Operations
  • New ClickFix Variant Exploits Network Drives
  • Humata Health Enhances Security with AccuKnox Partnership
  • Iran-Linked Cyber Attacks Threaten US Amidst Ongoing Conflict
  • Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News