14.3 C
New York
May 14, 2026
GstechZone
Tech

The third main Linux kernel flaw in two weeks has been discovered – due to AI


Lenovo AI PC Transparent laptop
Kerry Wan/ZDNET

Comply with ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • One other dangerous Linux kernel bug has appeared.
  • Fragnesia may give unauthorized customers root powers.
  • Extra open-source safety bugs are doubtless coming.

In keeping with Linus’s law“Given sufficient eyeballs, all bugs are shallow,” is prime to open supply.

Sadly, due to AI bug-finding instruments, comparable to Claude Mythos and OpenAI Daybreakbehind most of these eyeballs are AI engines, they usually’re proving to be a lot quicker at discovering safety issues than human ones.

Additionally: Linux is getting a security wake-up call – why it was inevitable and I’m not worried

So it’s the newest critical Linux kernel vulnerability, Fragnesiahas emerged. It is the third critical native root flaw within the final two weeks.

Fragnesia yields root on all main distributions

Following within the footsteps of Copy Fail and Dirty Fragthis page-cache corruption bug provides unprivileged customers a dependable path to full root management on affected methods. And what are these methods, you ask? In keeping with AlmaLinux, Fragnesia immediately yields root on all major distributions. So, primarily, all Linux distros can be targeted and successfully hacked. Are we having enjoyable but or what?

Additionally: Dirty Frag is a new Linux bug putting your system at risk – and there’s no easy fix yet

The bug was disclosed this week by the AI safety firm Zellicwith William Bowling and different researchers utilizing the corporate’s AI-agentic software auditing tool, V12. It really works by abusing a logic bug within the Linux XFRM (brief for “rework”) ESP-in-TCP subsystem to write down arbitrary bytes into the kernel web page cache of read-only information, with out requiring any race situation.

This opens the door to local privilege escalation and potential container escapes in multi-tenant environments.

Not like basic race-condition exploits, these vulnerabilities enable attackers to exactly corrupt file-backed pages with out timing methods, making assaults extra dependable and simpler to weaponize as soon as proof-of-concept code is obtainable.

A proof-of-concept exploit exists

Talking of which, there already exists a proof-of-concept exploit. It builds a 256-entry lookup desk that maps all potential keystream bytes to their corresponding nonces. The assault then copies a malicious payload, which overwrites the primary 192 bytes of the swap person command within the web page cache with a small ELF stub that calls setresuid and calls a shell.

In different phrases, for these of you who aren’t Linux consultants, it can instantly drop the attacker right into a root shell.

That is dangerous, dangerous information. It means an area person may acquire superuser (root) privileges. Red Hat provides it a Widespread Vulnerability Scoring System (CVSS) score of 7.8which makes it a high-level safety bug.

Additionally: This critical Linux vulnerability is putting millions of systems at risk – how to protect yours

Simply as dangerous, whereas Fragnesia is technically an area privilege-escalation bug, its influence scales dramatically in trendy cloud architectures that run massive numbers of untrusted containers on shared Linux kernels.

Right here, if an attacker can run code in a container or a restricted person account however nonetheless create namespaces and community stacks, that individual may get away to full root on the host and, from there, assault different customers’ digital machines (VMs) or containers.

mitigate Fragnesia

Kernel builders and distribution maintainers at the moment are working to harden the ESP-in-TCP code path, with proposed fixes specializing in eliminating in-place transformations on shared, file-backed pages and tightening fragment dealing with. An upstream patch to fix Fragnesia is obtainable now. But it surely’s not at present delivery in any distro as of Might 13.

Additionally: Immutable Linux delivers serious security – here are your 5 best options

Within the meantime, you’ll be able to mitigate it by working the next command as root:

# rmmod esp4 esp6 rxrpc

# printf ‘set up esp4 /bin/falseninstall esp6 /bin/falseninstall rxrpc /bin/falsen’ > /and many others/modprobe.d/fragnesia.conf

Nevertheless, in case you accomplish that, you may additionally knock out IPsecwhich suggests your Linux digital personal networks (VPNs) will not work. Comfortable, completely satisfied, pleasure, pleasure.

You’ll be able to, as a substitute, according to Red Hat, run the following command as root:

# echo “person.max_user_namespaces=0” > /and many others/sysctl.d/dirtyfrag.conf sysctl –system

Right here, nonetheless, there’s one other drawback: It disables unprivileged person namespaces, which can additionally have an effect on rootless containers, sandboxed browsers, and Flatpak.

Additionally: Nearly half of cybersecurity pros want to quit – here’s why

It is at all times one thing!

Wait on your distro to ship a patch

You could be higher off simply ready on your distro to ship a patch. I do know most main distros are already beta-testing the patch, and I would not be shocked if patched Linux kernels can be found by Might 14. Come that day, you need to patch your methods ASAP.

Why is that this taking place?

I will be going into extra element later, however for now, suffice it to say that Chris Wright, Crimson Hat’s CTO, and I spoke about this very difficulty earlier in the present day, and it boils all the way down to our AI fault detectors being much better than they were even a few weeks ago at finding real bugs.

Which means:

  1. We are able to count on to see many extra such safety holes being found within the subsequent few months.
  2. We will have to get loads quicker at fixing bugs as they seem.

Additionally: Apple, Google, and Microsoft join Anthropic’s Project Glasswing to defend world’s most critical software

This, by the way in which, is not only a drawback for Linux. It is troublesome for all open-source software program, and as AI will get higher at reverse-engineering binary code, Home windows and different proprietary software program builders might want to improve their restore abilities as effectively.





Source link

Related posts

The Man Behind AlphaGo Thinks AI Is Taking the Unsuitable Path

YouTube’s cellular app lastly helps you to share timestamped movies

Papa Johns Is Getting Into Drone Supply—however Not for Pizza