DMR News

Advancing Digital Conversations

CrackArmor Vulnerabilities In Linux AppArmor Could Expose Millions Of Systems

ByJolyen

Mar 17, 2026

CrackArmor Vulnerabilities In Linux AppArmor Could Expose Millions Of Systems

Security researchers from Qualys have disclosed nine vulnerabilities in the Linux kernel’s AppArmor module, collectively tracked as CrackArmor.

The flaws have reportedly existed since 2017 and could allow unprivileged users to bypass protections, escalate privileges to root, execute code in the kernel, or trigger denial-of-service conditions.

Because AppArmor is widely used across enterprise servers, cloud platforms, container environments, and IoT deployments, researchers estimate the vulnerabilities could potentially affect more than 12.6 million Linux systems.

AppArmor Plays A Key Role In Linux Security

AppArmor is a mandatory access control system that protects operating systems and applications by enforcing strict behavior policies.

It supplements the traditional Unix discretionary access model and helps block both known and unknown threats, including zero-day attacks.

The security module has been included in the Linux kernel since version 2.6.36, with development supported by Canonical since 2009.

AppArmor is enabled by default in several major Linux distributions, including Ubuntu, Debian, and SUSE.

CrackArmor Exploits A Confused-Deputy Flaw

According to Qualys researchers, the CrackArmor vulnerabilities expose a confused-deputy design flaw that allows unprivileged users to manipulate AppArmor security profiles.

Attackers can exploit pseudo-files such as /sys/kernel/security/apparmor/.load and .replace to trick privileged processes into modifying security policies.

Researchers said attackers could leverage trusted tools such as Sudo and Postfix to bypass namespace restrictions and execute arbitrary code within the kernel.

“This CrackArmor advisory exposes a confused-deputy flaw allowing unprivileged users to manipulate security profiles via pseudo-files, bypass user-namespace restrictions, and execute arbitrary code within the kernel,” the report states.

Potential Impact Includes Root Access And System Disruption

Successful exploitation could allow attackers to escalate privileges to root, bypass Kernel Address Space Layout Randomization protections, and collapse container isolation boundaries.

The vulnerabilities could also trigger denial-of-service attacks by forcing kernel panics or system reboots.

Researchers noted that unprivileged users could load “deny-all” security profiles or remove nested subprofiles to disrupt system operations.

Given the prevalence of AppArmor in enterprise Linux deployments and container environments such as Kubernetes, the vulnerabilities could impact system confidentiality, integrity, and availability.

Researchers Withhold Exploits As Patching Is Recommended

Qualys researchers developed proof-of-concept exploits during testing but have not released them publicly to reduce the risk of exploitation.

No CVE identifiers have yet been assigned to the vulnerabilities.

Security teams are being advised to patch affected Linux kernels immediately, as updates remain the only reliable mitigation.

Organizations are also encouraged to scan systems using Qualys QIDs, monitor the /sys/kernel/security/apparmor/ directory for unauthorized profile changes, and review vendor advisories for affected versions and available fixes.

Researchers emphasized that rapid patching is critical because interim mitigations do not provide the same level of protection as vendor-provided kernel updates.


Featured image credits: Wikimedia Commons

For more stories like it, click the +Follow button at the top of this page to follow us.

Jolyen

As a news editor, I bring stories to life through clear, impactful, and authentic writing. I believe every brand has something worth sharing. My job is to make sure it’s heard. With an eye for detail and a heart for storytelling, I shape messages that truly connect.

Leave a Reply

Your email address will not be published. Required fields are marked *