CrackArmor flaws in AppArmor open path to root access on millions of Linux systems


Qualys has disclosed a set of nine AppArmor vulnerabilities, collectively named CrackArmor, that can let an unprivileged local user weaken security controls, escalate privileges to root, and in some cases break container isolation. The researchers say the flaws have existed since Linux kernel 4.11 in 2017 and affect systems where AppArmor runs by default, including Ubuntu, Debian, and SUSE-based environments.

The headline-grabbing number comes from Qualys itself. The company says more than 12.6 million enterprise Linux instances run with AppArmor enabled by default, which gives this disclosure unusually broad reach across servers, cloud workloads, Kubernetes environments, IoT, and edge systems.

This is not a remote worm, and that distinction matters. Canonical says all of the vulnerabilities require unprivileged local user access. In other words, an attacker must already have a foothold on the machine or inside a containerized environment before trying to chain these bugs into a full compromise. Even so, that still makes the flaws highly important for shared systems, multi-user servers, and container hosts.

Qualys says the main issue is a confused deputy problem in AppArmor policy management. In its write-up, the company explains that an unprivileged user can manipulate AppArmor pseudo-files through trusted privileged tools, then use that primitive to remove protections, load hostile profiles, crash the system, leak kernel memory, or reach root through follow-on bugs. Openwall’s oss-security thread, which carries the technical disclosure, describes the same chain and lists additional kernel-side weaknesses including out-of-bounds reads, a use-after-free, a double-free, and stack exhaustion.

Canonical’s response adds an important nuance that many summaries miss. On Ubuntu hosts that are not running containers, exploitation usually needs cooperation from a privileged application such as su or a vulnerable sudo path. In container deployments, Canonical says the AppArmor kernel vulnerabilities may be exploitable without a cooperating privileged userspace application, which is why container environments deserve special attention.

What CrackArmor can do

ImpactWhat researchers say
Local privilege escalationQualys says unprivileged users can escalate to full root privileges through chained AppArmor issues.
Policy bypassAttackers can remove or replace AppArmor protections for important services.
Container escape riskCanonical says container deployments could theoretically face escape scenarios.
Denial of serviceOpenwall details kernel stack exhaustion and profile abuse that can crash systems.
Kernel memory disclosureOpenwall says out-of-bounds reads can leak kernel memory and KASLR-relevant pointers.

Sources: Qualys advisory, Canonical blog, Openwall disclosure.

Why this disclosure stands out

The most serious part is not just the bug count. It is the combination of reach, age, and privilege impact. Qualys says the flaws date back to 2017, and Canonical confirms that all supported Ubuntu releases are affected by the core confused deputy vulnerability. Debian has already published security updates for affected kernel packages in stable and oldstable, which shows vendors are treating the issue as urgent even before CVE IDs are assigned.

Another key point is that there are no CVE IDs yet. Both Qualys and Canonical say the CrackArmor issues had not received CVE assignments at publication time. That should not slow down patching. Vendor guidance already exists, and the lack of a CVE does not change the risk for exposed systems.

What Ubuntu and Debian have said

Canonical says it has prepared Linux kernel security updates for supported Ubuntu releases and also shipped userspace mitigations for sudo and util-linux. The company strongly recommends installing both the kernel fixes and the userspace updates, then rebooting after the kernel upgrade. Canonical also notes that sudo-rs in Ubuntu 25.10 and later is not affected by the related sudo issue used in one host-side chain.

Debian security advisories published on March 12, 2026 say several AppArmor vulnerabilities in the Linux kernel have been fixed in updated linux packages for stable and oldstable. The Debian notices point directly to the Qualys advisory and recommend upgrading the kernel packages.

What admins should do now

  • Patch the Linux kernel on AppArmor-enabled systems as soon as vendor fixes are available.
  • On Ubuntu, apply both kernel updates and the userspace updates for sudo and util-linux, then reboot.
  • Prioritize multi-user systems, container hosts, and internet-facing Linux servers with local access paths for users or workloads. This is an inference based on the local-access requirement and Canonical’s container guidance.
  • Watch for unexpected changes involving AppArmor policy handling and investigate local privilege escalation activity. Qualys specifically highlights policy manipulation as part of the attack chain.

FAQ

What is CrackArmor?

CrackArmor is Qualys’ name for a group of nine AppArmor vulnerabilities that can let local attackers weaken protections, escalate privileges, and potentially break container isolation.

Can this be exploited remotely?

The published guidance says the bugs require unprivileged local user access. They are not described as remote unauthenticated flaws.

Are CVEs assigned yet?

No. Qualys and Canonical both said CVE IDs had not been assigned at publication time.

Which Linux systems are most relevant here?

Qualys names Ubuntu, Debian, and SUSE because AppArmor is widely enabled there by default. Canonical and Debian have already published mitigation or patch guidance.

What is the first thing admins should do?

Install vendor kernel updates. On Ubuntu, also install the related sudo and util-linux updates, then reboot.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages