The third major Linux kernel flaw in two weeks has been found – thanks to AI


Lenovo AI PC Transparent laptop

Kerry Wan/ZDNET

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Another bad Linux kernel bug has appeared.
  • Fragnesia can give unauthorized users root powers.
  • More open-source security bugs are likely coming.

According to Linus’s law, “Given enough eyeballs, all bugs are shallow,” is fundamental to open source. 

Unfortunately, thanks to AI bug-finding tools, such as Claude Mythos and OpenAI Daybreak, behind most of those eyeballs are AI engines, and they’re proving to be much faster at finding security problems than human ones. 

Also: Linux is getting a security wake-up call – why it was inevitable and I’m not worried

So it is the latest serious Linux kernel vulnerability, Fragnesia, has emerged. It’s the third serious local root flaw in the last two weeks.

Fragnesia yields root on all major distributions

Following in the footsteps of Copy Fail and Dirty Frag, this page-cache corruption bug gives unprivileged users a reliable path to full root control on affected systems. And what are those systems, you ask? According to AlmaLinux, Fragnesia immediately yields root on all major distributions. So, essentially, all Linux distros can be targeted and successfully hacked. Are we having fun yet or what?

Also: Dirty Frag is a new Linux bug putting your system at risk – and there’s no easy fix yet

The bug was disclosed this week by the AI security company Zellic, with William Bowling and other researchers using the company’s AI-agentic software auditing tool, V12. It works by abusing a logic bug in the Linux XFRM (short for “transform”) ESP-in-TCP subsystem to write arbitrary bytes into the kernel page cache of read-only files, without requiring any race condition. 

This opens the door to local privilege escalation and potential container escapes in multi-tenant environments.

Unlike classic race-condition exploits, these vulnerabilities allow attackers to precisely corrupt file-backed pages without timing tricks, making attacks more reliable and easier to weaponize once proof-of-concept code is available.

A proof-of-concept exploit exists

Speaking of which, there already exists a proof-of-concept exploit. It builds a 256-entry lookup table that maps all possible keystream bytes to their corresponding nonces. The attack then copies a malicious payload, which overwrites the first 192 bytes of the switch user command in the page cache with a small ELF stub that calls setresuid and calls a shell. 

In other words, for those of you who aren’t Linux experts, it will immediately drop the attacker into a root shell.

This is bad, bad news. It means a local user could gain superuser (root) privileges. Red Hat gives it a Common Vulnerability Scoring System (CVSS) score of 7.8, which makes it a high-level security bug.

Also: This critical Linux vulnerability is putting millions of systems at risk – how to protect yours

Just as bad, while Fragnesia is technically a local privilege-escalation bug, its impact scales dramatically in modern cloud architectures that run large numbers of untrusted containers on shared Linux kernels. 

Here, if an attacker can run code in a container or a restricted user account but still create namespaces and network stacks, that person could break out to full root on the host and, from there, attack other users’ virtual machines (VMs) or containers.

How to mitigate Fragnesia

Kernel developers and distribution maintainers are now working to harden the ESP-in-TCP code path, with proposed fixes focusing on eliminating in-place transformations on shared, file-backed pages and tightening fragment handling. An upstream patch to fix Fragnesia is available now. But it’s not currently shipping in any distro as of May 13.

Also: Immutable Linux delivers serious security – here are your 5 best options

In the meantime, you can mitigate it by running the following command as root:

# rmmod esp4 esp6 rxrpc

# printf ‘install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n’ > /etc/modprobe.d/fragnesia.conf

However, if you do so, you’ll also knock out IPsec, which means your Linux virtual private networks (VPNs) won’t work. Happy, happy, joy, joy.

You can, instead, according to Red Hat, run the following command as root:

# echo “user.max_user_namespaces=0” > /etc/sysctl.d/dirtyfrag.conf sysctl –system

Here, however, there’s another problem: It disables unprivileged user namespaces, which may also affect rootless containers, sandboxed browsers, and Flatpak. 

Also: Nearly half of cybersecurity pros want to quit – here’s why

It’s always something!

Wait for your distro to deliver a patch

You might be better off just waiting for your distro to deliver a patch. I know most major distros are already beta-testing the patch, and I wouldn’t be surprised if patched Linux kernels are available by May 14. Come that day, you should patch your systems ASAP.

Why is this happening? 

I’ll be going into more detail later, but for now, suffice it to say that Chris Wright, Red Hat’s CTO, and I spoke about this very issue earlier today, and it boils down to our AI fault detectors being much better than they were even a few weeks ago at finding real bugs

That means:

  1. We can expect to see many more such security holes being discovered in the next few months.
  2. We’re going to need to get a lot faster at fixing bugs as they appear.

Also: Apple, Google, and Microsoft join Anthropic’s Project Glasswing to defend world’s most critical software

This, by the way, isn’t just a problem for Linux. It’s troublesome for all open-source software, and as AI gets better at reverse-engineering binary code, Windows and other proprietary software developers will need to upgrade their repair skills as well.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews







Virtually every new SUV will depreciate in value over its life as the miles rack up and components start to wear out. However, some of them depreciate much faster than others. At one end of the spectrum, there are some models from the likes of Cadillac, Tesla, and Infiniti, all of which can lose close to two-thirds of their value after just half a decade on the road. That makes them some of the worst-depreciating SUVs on the market. At the other end, there are SUVs like the Toyota Land Cruiser.

The exact resale value of any used car will depend on factors like its trim, condition, and mileage, but on average, Land Cruiser owners can expect a higher trade-in value than most rivals will fetch. According to data from CarEdge, a new Land Cruiser can be expected to lose around 35% of its original value after five years on the road, assuming it covers around 13,500 miles annually.

Estimates from iSeeCars make for equally encouraging reading for Land Cruiser owners, with the outlet estimating that after five years, a new example will lose just 34.4% of its sticker price. Even after seven years on the road, iSeeCars estimates that the average Land Cruiser will still be worth a little over half of what buyers originally paid for it.

The Land Cruiser holds its value well

The estimate from iSeeCars puts the Land Cruiser slightly ahead of average for value retention in the large hybrid SUV segment, and significantly ahead of the overall market average for new SUVs. According to the same data, the average new SUV can expect to lose 44.9% of its value over the same period, over 10% more than the Land Cruiser. That said, a different Toyota SUV is forecast to retain even more of its value.

Since the 2025 model year, both the Land Cruiser and the 4Runner have shared their platform and hybrid powertrains. However, according to current estimates, the 4Runner is the clear winner when it comes to resale value. Data from iSeeCars forecasts that a new, non-hybrid 4Runner is likely to lose only 25.4% of its value after its first five years, and CarEdge predicts almost exactly the same figure. According to the former outlet, a hybrid 4Runner will lose slightly more of its value over the same timeframe, shedding 28.6% on average.

While the 4Runner is the better choice purely for value retention, that only forms part of the equation for most buyers. The Land Cruiser remains appealing thanks to its mix of off-road capability and on-road refinement, with even the base 2026 trim offering plenty of standard features, despite missing out on the luxuries that higher trims include.





Source link