Multiple Vulnerabilities in AppArmor AKA CrackArmor
On 12 March, Qualys Threat Research disclosed multiple vulnerabilities in the Linux Mandatory Access Control (MAC) framework AppArmor, both in the Linux kernel as well as the AppArmor implementation on popular Linux distributions including Ubuntu, Debian and SUSE. A successful attack involving these vulnerabilities could allow a threat actor with access to the local filesystem to escalate their privileges to Root, bypass MAC policies, or execute a Denial of Service against the vulnerable system.
Both Dimension v2.3 and WebBlockerServer v2.1 run on an effected version of the Ubuntu operating system. While both Dimension and WebBlocker received automated security updates through the built-in unattended upgrades utility, Linux kernel patches are not available through this utility and must instead be manually installed.
See the Knowledge Base article Are Dimension and WebBlocker Server affected by the Linux kernel vulnerabilities (CVE-2026-23268 and CVE-2026-23269) for specific instructions on how to manually install the kernel updates on affected systems.
| Product Family | Product Branch | Product List |
|---|---|---|
Dimension
|
Dimension | Dimension |