Nine critical vulnerabilities in Linux AppArmor have been discovered, affecting over 12 million enterprise systems that rely on this security module. These flaws, dubbed "CrackArmor" by Qualys researchers, can be exploited by an unprivileged local attacker to gain full root access, escape container isolation, and crash systems without needing administrative credentials1. The vulnerabilities have been present since Linux kernel version 4.11, released in 2017, and impact popular distributions such as Ubuntu, Debian, and SUSE. As a result, attackers can potentially compromise the security of these systems, highlighting the need for immediate patching and mitigation. The fact that these vulnerabilities have gone undetected for so long underscores the importance of regular security audits and testing, so what matters most to practitioners is the urgent need to assess and address these weaknesses to prevent potential breaches.
Nine critical vulnerabilities in Linux AppArmor put over 12M enterprise systems at risk
⚡ High Priority
Why This Matters
Dubbed “CrackArmor” by the Qualys Threat Research Unit (TRU), the vulnerabilities have existed since Linux kernel version 4.11, released in 2017.
References
- CSO Online. (2026, March 16). Nine critical vulnerabilities in Linux AppArmor put over 12M enterprise systems at risk. *CSO Online*. https://www.csoonline.com/article/4145539/nine-critical-vulnerabilities-in-linux-apparmor-put-over-12m-enterprise-systems-at-risk.html
Original Source
CSO Online
Read original →