Security Advisory Detail

Multiple Vulnerabilities in AppArmor AKA CrackArmor

Advisory ID
WGSA-2026-00008
CVE
CVE-2026-23268, CVE-2026-23269
Impact
High
Status
Resolved
Product Family
Dimension
Published Date
Updated Date
Workaround Available
False
Summary

On 12 March, Qualys Threat Research disclosed multiple vulnerabilities in the Linux Mandatory Access Control (MAC) framework AppArmor, both in the Linux kernel as well as the AppArmor implementation on popular Linux distributions including Ubuntu, Debian and SUSE. A successful attack involving these vulnerabilities could allow a threat actor with access to the local filesystem to escalate their privileges to Root, bypass MAC policies, or execute a Denial of Service against the vulnerable system.

Affected

Both Dimension v2.3 and WebBlockerServer v2.1 run on an effected version of the Ubuntu operating system. While both Dimension and WebBlocker received automated security updates through the built-in unattended upgrades utility, Linux kernel patches are not available through this utility and must instead be manually installed.

Resolution

See the Knowledge Base article Are Dimension and WebBlocker Server affected by the Linux kernel vulnerabilities (CVE-2026-23268 and CVE-2026-23269) for specific instructions on how to manually install the kernel updates on affected systems.

Advisory Product List
Product Family Product Branch Product List
Dimension
Dimension Dimension