Ubuntu AppArmor Flaws Could Enable Local Privilege Escalation
TL;DR Summary
Qualys disclosed multiple vulnerabilities in Ubuntu’s AppArmor kernel security module (CrackArmor) that can cause memory leaks and DoS, and, when combined with a sudo discovery, may enable local privilege escalation. Canonical is rolling out fixes across affected Ubuntu releases, addressing issues from DFA state bounds and memory leaks to policy namespace limits and race conditions. The advisory also notes unsafe su behavior prompting hardening, with the sudo flaw affecting releases back to 22.04 LTS and su hardening traced to 20.04 LTS; more details are available in Qualys’ advisory.
- Ubuntu's AppArmor Hit By Several Security Issues - Can Yield Local Privilege Escalation Phoronix
- CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root Qualys
- Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation The Hacker News
- Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Complete Root Takeover CyberSecurityNews
- ‘CrackArmor’ Vulnerability in AppArmor Impacts 12.6M Linux Systems Hackread
Reading Insights
Total Reads
0
Unique Readers
4
Time Saved
2 min
vs 3 min read
Condensed
84%
567 → 88 words
Want the full story? Read the original article
Read on Phoronix