Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

These Legged Robots Can Rearrange Their Components to Dash Outside and Preserve Going After Each Break

March 14, 2026

Sensible Metropolis Networks Publicizes Key Group Promotions

March 14, 2026

Coding for underwater robotics – Robohub

March 14, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • These Legged Robots Can Rearrange Their Components to Dash Outside and Preserve Going After Each Break
  • Sensible Metropolis Networks Publicizes Key Group Promotions
  • Coding for underwater robotics – Robohub
  • Artifacts From NASA’s Webb, Parker Photo voltaic Probe on View at Smithsonian
  • Ferrari Amalfi Spider Opens the Door to Coastal Drives with Critical Muscle
  • How NetSuite Prices Break Down in 2026
  • Trump Meme Coin Worth, Buying and selling Quantity Skyrocket as Holders Vie for Unique Occasion Entry
  • With FDA go forward, a China biotech notches a primary in cell remedy testing
Saturday, March 14
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - 9 CrackArmor Flaws in Linux AppArmor Allow Root Escalation, Bypass Container Isolation
Cybersecurity & Digital Rights

9 CrackArmor Flaws in Linux AppArmor Allow Root Escalation, Bypass Container Isolation

NextTechBy NextTechMarch 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
9 CrackArmor Flaws in Linux AppArmor Allow Root Escalation, Bypass Container Isolation
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananMar 13, 2026Linux / Vulnerability

Cybersecurity researchers have disclosed a number of safety vulnerabilities inside the Linux kernel’s AppArmor module that may very well be exploited by unprivileged customers to avoid kernel protections, escalate to root, and undermine container isolation ensures.

The 9 confused deputy vulnerabilities have been collectively codenamed CrackArmor by the Qualys Menace Analysis Unit (TRU). The cybersecurity firm mentioned the difficulty has existed since 2017. No CVE identifiers have been assigned to the shortcomings.

AppArmor is a Linux safety module that gives necessary entry management (MAC) and secures the working system in opposition to exterior or inside threats by stopping recognized and unknown utility flaws from being exploited. It has been included within the mainline Linux kernel since model 2.6.36.

“This ‘CrackArmor’ advisory exposes a confused deputy flaw permitting unprivileged customers to govern safety profiles through pseudo-files, bypass user-namespace restrictions, and execute arbitrary code inside the kernel,” Saeed Abbasi, senior supervisor of Qualys TRU, mentioned.

“These flaws facilitate native privilege escalation to root by means of complicated interactions with instruments like Sudo and Postfix, alongside denial-of-service assaults through stack exhaustion and Kernel Tackle House Structure Randomization (KASLR) bypasses through out-of-bounds reads.”

Confused deputy vulnerabilities happen when a privileged program is coerced by an unauthorized person into misusing its privileges to carry out unintended, malicious actions. The issue basically exploits the belief related to a more-privileged instrument to execute a command that results in privilege escalation.

Qualys mentioned an entity that does not have permissions to carry out an motion can manipulate AppArmor profiles to disable important service protections or implement deny-all insurance policies, triggering denial-of-service (DoS) assaults within the course of.

“Mixed with kernel-level flaws inherent in profile parsing, attackers bypass user-namespace restrictions and obtain Native Privilege Escalation (LPE) to full root,” it added.

“Coverage manipulation compromises the complete host, whereas namespace bypasses facilitate superior kernel exploits corresponding to arbitrary reminiscence disclosure. DoS and LPE capabilities lead to service outages, credential tampering through passwordless root (e.g., /and so forth/passwd modification), or KASLR disclosure, which allows additional distant exploitation chains.”

To make issues worse, CrackArmor allows unprivileged customers to create absolutely‑succesful person namespaces, successfully getting round Ubuntu’s person namespace restrictions carried out through AppArmor, in addition to subvert important safety ensures like container isolation, least‑privilege enforcement, and repair hardening.

The cybersecurity firm mentioned it is withholding the discharge of proof-of-concept (PoC) exploits for the recognized flaws to present customers a while to prioritize patches and reduce publicity.

The issue impacts all Linux kernels since model 4.11 on any distribution that integrates AppArmor. With greater than 12.6 million enterprise Linux situations working with AppArmor enabled by default in a number of main distributions, corresponding to Ubuntu, Debian, and SUSE, speedy kernel patching is suggested to mitigate these vulnerabilities.

“Fast kernel patching stays the non-negotiable precedence for neutralizing these important vulnerabilities, as interim mitigation doesn’t supply the identical stage of safety assurance as restoring the vendor-fixed code path,” Abbasi famous.

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the newest breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s tendencies right now: learn extra, subscribe to our publication, and change into a part of the NextTech group at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

Google Fixes Two Chrome Zero-Days Exploited within the Wild Affecting Skia and V8

March 13, 2026

Six Android Malware Households Goal Pix Funds, Banking Apps, and Crypto Wallets

March 13, 2026

Apple Points Safety Updates for Older iOS Units Focused by Coruna WebKit Exploit

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

These Legged Robots Can Rearrange Their Components to Dash Outside and Preserve Going After Each Break

By NextTechMarch 14, 2026

Modules snap into place and leap ahead with a bounce over gravel or mud. Every…

Sensible Metropolis Networks Publicizes Key Group Promotions

March 14, 2026

Coding for underwater robotics – Robohub

March 14, 2026
Top Trending

These Legged Robots Can Rearrange Their Components to Dash Outside and Preserve Going After Each Break

By NextTechMarch 14, 2026

Modules snap into place and leap ahead with a bounce over gravel…

Sensible Metropolis Networks Publicizes Key Group Promotions

By NextTechMarch 14, 2026

At Sensible Metropolis Networks, our energy has at all times been rooted…

Coding for underwater robotics – Robohub

By NextTechMarch 14, 2026

Screenshot from video exhibiting underwater robotic automobile. Credit score: Tim Briggs/MIT Lincoln…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!