Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住关键点。 文章讲的是Linux内核的AppArmor模块发现了多个安全漏洞,这些漏洞可以让无权限的用户绕过内核保护,提升权限到root,甚至破坏容器隔离。这些漏洞被称作CrackArmor,存在时间从2017年开始,还没有CVE编号。 AppArmor是一个提供强制访问控制的安全模块,用来防止应用漏洞被利用。但这次的漏洞允许用户通过伪文件操控安全配置文件,绕过限制,执行任意代码。这会导致本地权限提升、拒绝服务攻击以及KASLR绕过。 此外,这些漏洞还影响了Ubuntu等系统的用户命名空间限制,破坏了容器隔离和最小权限策略。由于影响范围广,建议立即修补内核。 现在我要把这些信息浓缩到100字以内。需要包括:AppArmor模块发现漏洞、无权限用户可绕过保护、提升权限、破坏容器隔离、影响范围广、建议立即修补。 可能的结构:Linux内核的AppArmor模块存在多个安全漏洞,允许无权限用户绕过保护机制,提升权限至root,并破坏容器隔离。这些漏洞影响广泛,建议立即修补以缓解风险。 检查字数:刚好在100字以内。 </think> Linux内核的AppArmor模块存在多个安全漏洞(统称CrackArmor),允许无特权用户绕过保护机制、提升权限至root,并破坏容器隔离。这些漏洞自2017年起存在且影响广泛,建议立即修补以缓解风险。 2026-3-13 08:18:0 Author: thehackernews.com(查看原文) 阅读量:11 收藏

Nine CrackArmor Flaws

Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited by unprivileged users to circumvent kernel protections, escalate to root, and undermine container isolation guarantees.

The nine confused deputy vulnerabilities have been collectively codenamed CrackArmor by the Qualys Threat Research Unit (TRU). The cybersecurity company said the issue has existed since 2017. No CVE identifiers have been assigned to the shortcomings.

AppArmor is a Linux security module that provides mandatory access control (MAC) and secures the operating system against external or internal threats by preventing known and unknown application flaws from being exploited. It has been included in the mainline Linux kernel since version 2.6.36.

"This 'CrackArmor' advisory exposes a confused deputy flaw allowing unprivileged users to manipulate security profiles via pseudo-files, bypass user-namespace restrictions, and execute arbitrary code within the kernel," Saeed Abbasi, senior manager of Qualys TRU, said.

"These flaws facilitate local privilege escalation to root through complex interactions with tools like Sudo and Postfix, alongside denial-of-service attacks via stack exhaustion and Kernel Address Space Layout Randomization (KASLR) bypasses via out-of-bounds reads."

Confused deputy vulnerabilities occur when a privileged program is coerced by an unauthorized user into misusing its privileges to perform unintended, malicious actions. The problem essentially exploits the trust associated with a more-privileged tool to execute a command that leads to privilege escalation.

Qualys said an entity that doesn't have permissions to perform an action can manipulate AppArmor profiles to disable critical service protections or enforce deny-all policies, triggering denial-of-service (DoS) attacks in the process.

"Combined with kernel-level flaws inherent in profile parsing, attackers bypass user-namespace restrictions and achieve Local Privilege Escalation (LPE) to full root," it added.

"Policy manipulation compromises the entire host, while namespace bypasses facilitate advanced kernel exploits such as arbitrary memory disclosure. DoS and LPE capabilities result in service outages, credential tampering via passwordless root (e.g., /etc/passwd modification), or KASLR disclosure, which enables further remote exploitation chains."

To make matters worse, CrackArmor enables unprivileged users to create fully‑capable user namespaces, effectively getting around Ubuntu's user namespace restrictions implemented via AppArmor, as well as subvert critical security guarantees like container isolation, least‑privilege enforcement, and service hardening.

The cybersecurity company said it's withholding the release of proof-of-concept (PoC) exploits for the identified flaws to give users some time to prioritize patches and minimize exposure.

The problem affects all Linux kernels since version 4.11 on any distribution that integrates AppArmor. With more than 12.6 million enterprise Linux instances operating with AppArmor enabled by default in several major distributions, such as Ubuntu, Debian, and SUSE, immediate kernel patching is advised to mitigate these vulnerabilities.

"Immediate kernel patching remains the non-negotiable priority for neutralizing these critical vulnerabilities, as interim mitigation does not offer the same level of security assurance as restoring the vendor-fixed code path," Abbasi noted.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/nine-crackarmor-flaws-in-linux-apparmor.html
如有侵权请联系:admin#unsafe.sh