Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux AppArmor Vulnerabilities Risk Root Escalation

Linux AppArmor Vulnerabilities Risk Root Escalation

Posted on March 13, 2026 By CWS

Cybersecurity experts have identified significant security issues within the Linux kernel’s AppArmor module. These vulnerabilities, which have been present since 2017, allow unprivileged users to bypass kernel protections, escalate privileges to root, and compromise container isolation. The vulnerabilities have been dubbed ‘CrackArmor’ by the Qualys Threat Research Unit (TRU), although they currently lack CVE identifiers.

Understanding the AppArmor Module

AppArmor is a security module in Linux that enforces mandatory access control (MAC) to protect the operating system against various threats by preventing the exploitation of application vulnerabilities. It has been a part of the mainline Linux kernel since version 2.6.36. The recent findings highlight a ‘confused deputy’ flaw where users can exploit pseudo-files to manipulate security profiles, bypass user-namespace restrictions, and execute arbitrary kernel code.

Details of the CrackArmor Vulnerabilities

The vulnerabilities enable local privilege escalation to root, facilitated by complex interactions with tools like Sudo and Postfix. They also pose risks of denial-of-service attacks through stack exhaustion and the bypassing of Kernel Address Space Layout Randomization (KASLR) via out-of-bounds reads. These vulnerabilities exploit the trust associated with privileged tools to perform unauthorized, malicious actions.

Qualys warned that unauthorized users could manipulate AppArmor profiles to disable critical service protections or enforce deny-all policies, triggering DoS attacks. By exploiting kernel-level flaws in profile parsing, attackers can bypass user-namespace restrictions, leading to local privilege escalation (LPE) to full root access.

Implications and Recommendations

The CrackArmor vulnerabilities compromise entire host systems, allowing for advanced exploits such as arbitrary memory disclosure and credential tampering. They also undermine critical security guarantees, including container isolation and service hardening. Qualys has decided to withhold proof-of-concept (PoC) exploits to allow users time to prioritize patching efforts.

These vulnerabilities impact all Linux kernels since version 4.11 on distributions using AppArmor, affecting over 12.6 million enterprise Linux instances. Major distributions like Ubuntu, Debian, and SUSE are particularly vulnerable, and immediate kernel patching is strongly recommended to mitigate these risks effectively.

As per Saeed Abbasi from Qualys, interim mitigation measures do not offer the same level of security assurance as applying vendor-fixed code paths. Therefore, addressing these vulnerabilities through immediate patching is essential to neutralize potential threats.

The Hacker News Tags:AppArmor, container isolation, CrackArmor, cyber threats, Cybersecurity, kernel security, Linux, Qualys, root escalation, Vulnerabilities

Post navigation

Previous Post: Critical Security Update Addresses Veeam RCE Vulnerabilities
Next Post: Google Awards $17 Million in 2025 Bug Bounty Payouts

Related Posts

Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News
Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do The Hacker News
Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval The Hacker News
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module The Hacker News
Why Offensive Security Training Benefits Your Entire Security Team Why Offensive Security Training Benefits Your Entire Security Team The Hacker News
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Linked Cyber Attacks Threaten US Amidst Ongoing Conflict
  • Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat
  • Bold Security Unveils $40 Million Funding Round
  • Starbucks Phishing Attack Compromises Employee Data
  • Google Awards $17 Million in 2025 Bug Bounty Payouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Linked Cyber Attacks Threaten US Amidst Ongoing Conflict
  • Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat
  • Bold Security Unveils $40 Million Funding Round
  • Starbucks Phishing Attack Compromises Employee Data
  • Google Awards $17 Million in 2025 Bug Bounty Payouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News