Linux
5/19/2026 04:50:00 PM
AI News: The third major Linux kernel flaw in weeks has been discovered - thanks to AI
The third major Linux kernel flaw in weeks has been discovered - thanks to AI
AI is exposing Linux protection holes quicker than builders can patch them.
Fragnesia is the contemporary. Right here's what we recognise about it.
Steven-vaughan-nichols
Consistent with Linus's law, "given enough eyeballs, all bugs are shallow," is
essential to open source.
Unfortunately, the way to AI malicious program-finding tools, including Claude
Mythos and OpenAI Daybreak, in the back of most of these eyeballs are AI
engines, and they may be proving to be an awful lot quicker at finding
security problems than human ones.
So it is the contemporary critical Linux kernel vulnerability, fragnesia, that
has emerged. It's the 1/3 extreme neighborhood root flaw inside the ultimate
weeks.
Fragnesia yields root on all important distributions
Following in the footsteps of reproduction fail and dirty frag, this
page-cache corruption bug offers unprivileged users a dependable course to
full root control on affected structures. And what are the ones structures,
you ask? In line with AlmaLinux, Fragnesia without delay yields root on all
foremost distributions. So, essentially, all Linux distros can be targeted and
effectively hacked. Are we having fun yet or what?
The Trojan horse was changed into a disclosed this week by means of the ai
protection employer Zellic, with William Bowling and other researchers using
the enterprise's AI-agentic software auditing tool, v12. It works by using
abusing a good judgment malicious program in the Linux XFRM (brief for
"transform") esp-in-tcp subsystem to write arbitrary bytes into the kernel
page cache of study-handiest documents, with out requiring any race
condition.
This opens the door to local privilege escalation and potential container
escapes in multi-tenant environments.
Unlike conventional race-circumstance exploits, those vulnerabilities allow
attackers to exactly corrupt file-subsidized pages without timing hints,
making assaults more reliable and easier to weaponize once proof-of-concept
code is to be had.
An evidence-of-idea makes the most exists
Speaking of which, there already exists a proof-of-concept make the most. It
builds a 256-access research table that maps all viable keystream bytes to
their corresponding nonces. The attack then copies a malicious payload, which
overwrites the primary 192 bytes of the transfer consumer command inside the
page cache with a small elf stub that calls setresuid and calls a shell.
In different phrases, for the ones of you who aren't linux experts, it will
right away drop the attacker into a root shell.
This is horrific, bad information. It method a local consumer could benefit
from superuser (root) privileges. Pink hat gives it a commonplace
vulnerability scoring gadget (cvss) score of seven.Eight, which makes it an
excessive-level security bug.
Just as terrible, at the same time as fragnesia is technically a nearby
privilege-escalation computer virus, its effect scales dramatically in
modern-day cloud architectures that run large numbers of untrusted bins on
shared Linux kernels.
Here, if an attacker can run code in a box or a confined person account
however still create namespaces and network stacks, that individual ought to
gain root on the host and, from there, assault different customers' virtual
machines (vms) or containers.
The way to mitigate fragnesia
Kernel developers and distribution maintainers at the moment are running to
harden the esp-in-tcp code path, with proposed fixes specializing in getting
rid of in-vicinity differences on shared, record-sponsored pages and
tightening fragment handling. An upstream patch to fix fragnesia is available
now. However it's no longer currently shipping in any distro as of can also
thirteen.
In the meantime, you may mitigate it by running the following command as root:
# rmmod esp4 esp6 rxrpc
# printf 'set up esp4 /bin/falseninstall esp6 /bin/falseninstall rxrpc
/bin/falsen' > /and many others/modprobe.D/fragnesia.Conf
But, if you accomplish that, you'll also knock out ipsec, which means that
your linux virtual non-public networks (vpns) may not paintings. Satisfied,
happy, pleasure, joy.
You could, as a substitute, in step with crimson hat, run the following
command as root:
# echo "user.Max_user_namespaces=zero" > /and so
on/sysctl.D/dirtyfrag.Conf sysctl --machine
Here, but there's any other trouble: it disables unprivileged user namespaces,
which may also have an effect on rootless packing containers, sandboxed
browsers, and Flatpak.
It is always something!
Wait for your distro to deliver a patch
You might be better off just looking forward to your distro to supply a patch.
I recognize maximum major distros are already beta-testing the patch, and that
i wouldn't be surprised if patched linux kernels are to be had by way of may
additionally 14. Come that day, you have to patch your systems asap.
Why is this going on?
I'll be going into greater detail later, however for now, suffice it to
mention that Chris Wright, Red Hat's CTO, and that i spoke about this very
issue earlier these days, and it boils all the way down to our ai fault
detectors being a whole lot higher than they had been even some weeks ago at
locating real bugs.
That means:
We can expect to see many more such protection holes discovered in the
following few months.
We're going to want to get a lot quicker at fixing insects as they appear.
This, in this manner, is not only a problem for Linux. It's difficult for all
open-source software, and as AI gets better at reverse-engineering binary
code, Windows and other proprietary software developers will need to upgrade
their repair capabilities as well.






.png)
.png)
.png)
.png)



