9 AppArmor Bugs Hidden for 9 Years Let Attackers Escape Containers and Seize Root—12.6M Linux Systems at Risk
Nine kernel bugs in AppArmor—hidden since 2017—let unprivileged users become root, bust out of containers, and crash entire systems. Over 12 million enterprise Linux instances are exposed. Here's what you need to know (and patch) today.
⚡ Key Takeaways
- Nine AppArmor kernel bugs since 2017 allow unprivileged users to escalate to root, escape containers, and trigger kernel panics—affecting 12.6M Linux systems. 𝕏
- CrackArmor is a container escape vulnerability chain critical for Kubernetes clusters running on Ubuntu, Debian, or SUSE—attackers can breach pod isolation and access the entire node. 𝕏
- Patches exist (since March 2024), but you must manually update your kernel and reboot—check AppArmor status and kernel version on all nodes immediately. 𝕏
Worth sharing?
Get the best Open Source stories of the week in your inbox — no noise, no spam.
Originally reported by Dev.to