{"id":484343,"date":"2026-05-14T13:38:13","date_gmt":"2026-05-14T13:38:13","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/484343\/"},"modified":"2026-05-14T13:38:13","modified_gmt":"2026-05-14T13:38:13","slug":"the-third-major-linux-kernel-flaw-in-two-weeks-has-been-found-thanks-to-ai","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/484343\/","title":{"rendered":"The third major Linux kernel flaw in two weeks has been found &#8211; thanks to AI"},"content":{"rendered":"<p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2026\/05\/dsc01289.jpg\" alt=\"Lenovo AI PC Transparent laptop\" width=\"1280\" height=\"720\" fetchpriority=\"low\"\/>   Kerry Wan\/ZDNET<\/p>\n<p>Follow ZDNET: <a href=\"https:\/\/cc.zdnet.com\/v1\/otc\/00hQi47eqnEWQ6T9d4QLBUc?element=BODY&amp;element_label=Add+us+as+a+preferred+source&amp;module=LINK&amp;object_type=text-link&amp;object_uuid=b2ef2ba4-7e3b-45dd-9336-508fca1e5d60&amp;position=1&amp;template=article&amp;track_code=__COM_CLICK_ID__&amp;url=https%3A%2F%2Fwww.google.com%2Fpreferences%2Fsource%3Fq%3Dzdnet.com&amp;view_instance_uuid=6f5e0592-0471-4f7d-98cc-3f81cacd1578&amp;object_version=1bd08e41-81c3-497e-9d47-06e5ca27beb4\" rel=\"noopener nofollow sponsored\" target=\"_blank\">Add us as a preferred source<\/a> on Google.<\/p>\n<p> \tZDNET&#8217;s key takeaways <\/p>\n<ul>\n<li>Another bad Linux kernel bug has appeared.<\/li>\n<li>Fragnesia can give unauthorized users root powers.<\/li>\n<li>More open-source security bugs are likely coming.<\/li>\n<\/ul>\n<p>According to <a href=\"https:\/\/opensource.com\/article\/21\/2\/open-source-security\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Linus&#8217;s law<\/a>, &#8220;Given enough eyeballs, all bugs are shallow,&#8221; is fundamental to open source.\u00a0<\/p>\n<p>Unfortunately, thanks to AI bug-finding tools, such as <a href=\"https:\/\/red.anthropic.com\/2026\/mythos-preview\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Claude Mythos<\/a> and <a href=\"https:\/\/openai.com\/daybreak\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">OpenAI Daybreak<\/a>, behind most of those eyeballs are AI engines, and they&#8217;re proving to be much faster at finding security problems than human ones.\u00a0<\/p>\n<p><strong>Also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/linux-security-wake-up-call-copy-fail-dirty-frag-why-inevitable\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>Linux is getting a security wake-up call &#8211; why it was inevitable and I&#8217;m not worried<\/strong><\/a><\/p>\n<p>So it is the latest serious Linux kernel vulnerability, <a href=\"https:\/\/lwn.net\/ml\/all\/8733zvfucm.fsf%40gentoo.org\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Fragnesia<\/a>, has emerged. It&#8217;s the third serious local root flaw in the last two weeks.<\/p>\n<p>Fragnesia yields root on all major distributions<\/p>\n<p>Following in the footsteps of <a href=\"https:\/\/www.zdnet.com\/article\/critical-copy-fail-vulnerability-affecting-linux-systems-how-to-mitigate\/\" rel=\"nofollow noopener\" target=\"_blank\">Copy Fail<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/dirty-frag-new-linux-bug-system-at-risk-no-easy-fix\/\" rel=\"nofollow noopener\" target=\"_blank\">Dirty Frag<\/a>, this page-cache corruption bug gives unprivileged users a reliable path to full root control on affected systems. And what are those systems, you ask? According to AlmaLinux, <a href=\"https:\/\/almalinux.org\/blog\/2026-05-13-fragnesia-cve-2026-46300\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Fragnesia immediately yields root on all major distributions.<\/a> So, essentially, <a href=\"https:\/\/cybersecuritynews.com\/fragnesia-linux-vulnerability\/amp\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">all Linux distros can be targeted and successfully hacked.<\/a> Are we having fun yet or what? <\/p>\n<p><strong>Also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/dirty-frag-new-linux-bug-system-at-risk-no-easy-fix\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>Dirty Frag is a new Linux bug putting your system at risk &#8211; and there&#8217;s no easy fix yet<\/strong><\/a><\/p>\n<p>The <a href=\"https:\/\/x.com\/v12sec\/status\/2054491454064746629\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">bug was disclosed this week<\/a> by the AI security company <a href=\"https:\/\/www.zellic.io\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Zellic<\/a>, with William Bowling and other researchers using the company&#8217;s <a href=\"https:\/\/v12.sh\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">AI-agentic software auditing tool, V12<\/a>. It works by abusing a logic bug in the Linux XFRM (short for &#8220;transform&#8221;) <a href=\"https:\/\/docs.fortinet.com\/document\/fortigate\/8.0.0\/administration-guide\/351073\/encapsulate-esp-packets-within-tcp-headers\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">ESP-in-TCP<\/a> subsystem to write arbitrary bytes into the kernel page cache of read-only files, without requiring any race condition.\u00a0<\/p>\n<p>This <a href=\"https:\/\/www.wiz.io\/blog\/fragnesia-linux-kernel-local-privilege-escalation-via-esp-in-tcp\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">opens the door to local privilege escalation<\/a> and potential container escapes in multi-tenant environments. <\/p>\n<p>Unlike classic race-condition exploits, these vulnerabilities allow attackers to precisely corrupt file-backed pages without timing tricks, making attacks more reliable and easier to weaponize once proof-of-concept code is available. <\/p>\n<p>A proof-of-concept exploit exists<\/p>\n<p>Speaking of which, there already exists a proof-of-concept exploit. It builds a 256-entry lookup table that maps all possible keystream bytes to their corresponding <a href=\"https:\/\/www.okta.com\/identity-101\/nonce\/#link=%7B%22linkText%22:%22nonces%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.okta.com\/identity-101\/nonce\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D#link={%22role%22:%22standard%22,%22href%22:%22https:\/\/www.okta.com\/identity-101\/nonce\/#link=%7B%22linkText%22:%22nonces%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.okta.com\/identity-101\/nonce\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%22,%22target%22:%22%22,%22absolute%22:%22%22,%22linkText%22:%22nonces%22}\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">nonces<\/a>. The attack then copies a malicious payload, which overwrites the first 192 bytes of the switch user command in the page cache with a small ELF stub that calls setresuid and calls a shell.\u00a0<\/p>\n<p>In other words, for those of you who aren&#8217;t Linux experts, it will immediately drop the attacker into a root shell. <\/p>\n<p>This is bad, bad news. It means a local user could gain superuser (root) privileges. <a href=\"https:\/\/www.redhat.com\/en\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Red Hat<\/a> gives it a Common Vulnerability Scoring System <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2026-46300\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">(CVSS) score of 7.8<\/a>, which makes it a high-level security bug. <\/p>\n<p><strong>Also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/critical-copy-fail-vulnerability-affecting-linux-systems-how-to-mitigate\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>This critical Linux vulnerability is putting millions of systems at risk &#8211; how to protect yours<\/strong><\/a><\/p>\n<p>Just as bad, while Fragnesia is technically a local privilege-escalation bug, its impact scales dramatically in modern cloud architectures that run large numbers of untrusted containers on shared Linux kernels.\u00a0<\/p>\n<p>Here, if an attacker can run code in a container or a restricted user account but still create namespaces and network stacks, that person could break out to full root on the host and, from there, attack other users&#8217; virtual machines (VMs) or containers. <\/p>\n<p>How to mitigate Fragnesia<\/p>\n<p>Kernel developers and distribution maintainers are now working to harden the ESP-in-TCP code path, with proposed fixes focusing on eliminating in-place transformations on shared, file-backed pages and tightening fragment handling. An upstream <a href=\"https:\/\/lore.kernel.org\/netdev\/20260513041635.1289541-1-vakzz@zellic.io\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">patch to fix Fragnesia<\/a> is available now. But it&#8217;s not currently shipping in any distro as of May 13. <\/p>\n<p><strong>Also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/immutable-linux-delivers-serious-security-here-are-your-5-best-options\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>Immutable Linux delivers serious security &#8211; here are your 5 best options<\/strong><\/a><\/p>\n<p>In the meantime, you can mitigate it by running the following command as root: <\/p>\n<p># rmmod esp4 esp6 rxrpc <\/p>\n<p># printf &#8216;install esp4 \/bin\/false\\ninstall esp6 \/bin\/false\\ninstall rxrpc \/bin\/false\\n&#8217; &gt; \/etc\/modprobe.d\/fragnesia.conf <\/p>\n<p>However, if you do so, you&#8217;ll also knock out <a href=\"https:\/\/www.cloudflare.com\/learning\/network-layer\/what-is-ipsec\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">IPsec<\/a>, which means your Linux virtual private networks (VPNs) won&#8217;t work. Happy, happy, joy, joy. <\/p>\n<p>You can, instead, <a href=\"https:\/\/access.redhat.com\/security\/vulnerabilities\/RHSB-2026-003\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">according to Red Hat, run the following command as root<\/a>: <\/p>\n<p># echo &#8220;user.max_user_namespaces=0&#8221; &gt; \/etc\/sysctl.d\/dirtyfrag.conf sysctl &#8211;system <\/p>\n<p>Here, however, there&#8217;s another problem: It disables unprivileged user namespaces, which may also affect rootless containers, sandboxed browsers, and Flatpak.\u00a0<\/p>\n<p><strong>Also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/nearly-half-of-cybersecurity-pros-want-to-quit-heres-why\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>Nearly half of cybersecurity pros want to quit &#8211; here&#8217;s why<\/strong><\/a><\/p>\n<p>It&#8217;s always something!<\/p>\n<p>Wait for your distro to deliver a patch<\/p>\n<p>You might be better off just waiting for your distro to deliver a patch. I know most major distros are already beta-testing the patch, and I wouldn&#8217;t be surprised if patched Linux kernels are available by May 14. Come that day, you should patch your systems ASAP. <\/p>\n<p>Why is this happening?\u00a0<\/p>\n<p>I&#8217;ll be going into more detail later, but for now, suffice it to say that Chris Wright, Red Hat&#8217;s CTO, and I spoke about this very issue earlier today, and it boils down to our <a href=\"https:\/\/www.zdnet.com\/article\/maybe-open-source-needs-ai\/\" rel=\"nofollow noopener\" target=\"_blank\">AI fault detectors being much better than they were even a few weeks ago at finding real bugs<\/a>.\u00a0<\/p>\n<p>That means:<\/p>\n<ol>\n<li>We can expect to see many more such security holes being discovered in the next few months.<\/li>\n<li>We&#8217;re going to need to get a lot faster at fixing bugs as they appear. <\/li>\n<\/ol>\n<p><strong>Also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/project-glasswing-microsoft-google-apple-anthropic\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>Apple, Google, and Microsoft join Anthropic&#8217;s Project Glasswing to defend world&#8217;s most critical software<\/strong><\/a><\/p>\n<p>This, by the way, isn&#8217;t just a problem for Linux. It&#8217;s troublesome for all open-source software, and as AI gets better at reverse-engineering binary code, Windows and other proprietary software developers will need to upgrade their repair skills as well. <\/p>\n","protected":false},"excerpt":{"rendered":"Kerry Wan\/ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET&#8217;s key takeaways Another bad Linux&hellip;\n","protected":false},"author":2,"featured_media":484344,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[18,19,17,82],"class_list":{"0":"post-484343","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-eire","9":"tag-ie","10":"tag-ireland","11":"tag-technology"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ie\/116573209707213452","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/484343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=484343"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/484343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/484344"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=484343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=484343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=484343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}