Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux AppArmor Vulnerabilities Risk Root Escalation

Linux AppArmor Vulnerabilities Risk Root Escalation

Posted on March 13, 2026 By CWS

Cybersecurity experts have identified significant security issues within the Linux kernel’s AppArmor module. These vulnerabilities, which have been present since 2017, allow unprivileged users to bypass kernel protections, escalate privileges to root, and compromise container isolation. The vulnerabilities have been dubbed ‘CrackArmor’ by the Qualys Threat Research Unit (TRU), although they currently lack CVE identifiers.

Understanding the AppArmor Module

AppArmor is a security module in Linux that enforces mandatory access control (MAC) to protect the operating system against various threats by preventing the exploitation of application vulnerabilities. It has been a part of the mainline Linux kernel since version 2.6.36. The recent findings highlight a ‘confused deputy’ flaw where users can exploit pseudo-files to manipulate security profiles, bypass user-namespace restrictions, and execute arbitrary kernel code.

Details of the CrackArmor Vulnerabilities

The vulnerabilities enable local privilege escalation to root, facilitated by complex interactions with tools like Sudo and Postfix. They also pose risks of denial-of-service attacks through stack exhaustion and the bypassing of Kernel Address Space Layout Randomization (KASLR) via out-of-bounds reads. These vulnerabilities exploit the trust associated with privileged tools to perform unauthorized, malicious actions.

Qualys warned that unauthorized users could manipulate AppArmor profiles to disable critical service protections or enforce deny-all policies, triggering DoS attacks. By exploiting kernel-level flaws in profile parsing, attackers can bypass user-namespace restrictions, leading to local privilege escalation (LPE) to full root access.

Implications and Recommendations

The CrackArmor vulnerabilities compromise entire host systems, allowing for advanced exploits such as arbitrary memory disclosure and credential tampering. They also undermine critical security guarantees, including container isolation and service hardening. Qualys has decided to withhold proof-of-concept (PoC) exploits to allow users time to prioritize patching efforts.

These vulnerabilities impact all Linux kernels since version 4.11 on distributions using AppArmor, affecting over 12.6 million enterprise Linux instances. Major distributions like Ubuntu, Debian, and SUSE are particularly vulnerable, and immediate kernel patching is strongly recommended to mitigate these risks effectively.

As per Saeed Abbasi from Qualys, interim mitigation measures do not offer the same level of security assurance as applying vendor-fixed code paths. Therefore, addressing these vulnerabilities through immediate patching is essential to neutralize potential threats.

The Hacker News Tags:AppArmor, container isolation, CrackArmor, cyber threats, Cybersecurity, kernel security, Linux, Qualys, root escalation, Vulnerabilities

Post navigation

Previous Post: Critical Security Update Addresses Veeam RCE Vulnerabilities
Next Post: Google Awards $17 Million in 2025 Bug Bounty Payouts

Related Posts

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale The Hacker News
Introducing Astrix’s AI Agent Control Plane Introducing Astrix’s AI Agent Control Plane The Hacker News
CISA Identifies Exploited Wing FTP Vulnerability CISA Identifies Exploited Wing FTP Vulnerability The Hacker News
Meta Expands WhatsApp Security Research with New Proxy Tool and M in Bounties This Year Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year The Hacker News
Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More The Hacker News
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark