{"id":137691,"date":"2026-05-14T12:42:18","date_gmt":"2026-05-14T12:42:18","guid":{"rendered":"https:\/\/christiancorner.us\/index.php\/2026\/05\/14\/third-major-linux-kernel-flaw-found-in-two-weeks-thanks-to-ai\/"},"modified":"2026-05-14T12:43:44","modified_gmt":"2026-05-14T12:43:44","slug":"third-major-linux-kernel-flaw-found-in-two-weeks-thanks-to-ai","status":"publish","type":"post","link":"https:\/\/christiancorner.us\/index.php\/2026\/05\/14\/third-major-linux-kernel-flaw-found-in-two-weeks-thanks-to-ai\/","title":{"rendered":"Third major Linux kernel flaw found in two weeks \u2013 thanks to AI"},"content":{"rendered":"<p>\n<\/p>\n<div>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\" style=\"aspect-ratio:1280\/720;\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/cf3cba08378050f9950cd09cccae6553570e10e9\/2024\/02\/26\/bb9ba4fc-080d-4e29-9077-a8ccde9cb7b4\/dsc01289.jpg?auto=webp&amp;width=768\" alt=\"Lenovo AI PC Transparent laptop\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7b4d8c709f4e0b36065f8322b572efba08cc9d6b\/2024\/02\/26\/bb9ba4fc-080d-4e29-9077-a8ccde9cb7b4\/dsc01289.jpg?auto=webp&amp;width=1024\" alt=\"Lenovo AI PC Transparent laptop\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c27a502dcaefca16466734b9b54aac3a69b479d\/2024\/02\/26\/bb9ba4fc-080d-4e29-9077-a8ccde9cb7b4\/dsc01289.jpg?auto=webp&amp;width=1280\" alt=\"Lenovo AI PC Transparent laptop\"><\/source><\/source><\/source><\/picture><\/div>\n<\/p><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Kerry Wan\/ZDNET<\/span><\/figcaption><\/figure>\n<p><em>Follow ZDNET: <\/em><span class=\"c-commerceLink\"><a rel=\"noopener nofollow sponsored\" target=\"_blank\" href=\"https:\/\/cc.zdnet.com\/v1\/otc\/00hQi47eqnEWQ6T9d4QLBUc?element=BODY&amp;element_label=Add+us+as+a+preferred+source&amp;module=LINK&amp;object_type=text-link&amp;object_uuid=b2ef2ba4-7e3b-45dd-9336-508fca1e5d60&amp;position=1&amp;template=article&amp;track_code=__COM_CLICK_ID__&amp;url=https%3A%2F%2Fwww.google.com%2Fpreferences%2Fsource%3Fq%3Dzdnet.com&amp;view_instance_uuid=6f5e0592-0471-4f7d-98cc-3f81cacd1578&amp;object_version=1bd08e41-81c3-497e-9d47-06e5ca27beb4\"><span>Add us as a favorite source<\/span><!----><\/a><\/span><em>    On Google.<\/em><\/p>\n<hr\/>\n<h3> \t \t \t \tZDNET Highlights <\/h3>\n<ul>\n<li>Another nasty Linux kernel bug has surfaced.<\/li>\n<li>Fragnesia can grant root powers to unauthorized users.<\/li>\n<li>More open-source security bugs are likely to come.<\/li>\n<\/ul>\n<hr\/>\n<p>according to <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/opensource.com\/article\/21\/2\/open-source-security\" class=\"c-regularLink\">Linus&#8217;s law<\/a>&#8220;Given enough attention, all bugs are shallow,&#8221; is fundamental to open source. <\/p>\n<p>Unfortunately, thanks to AI bug-finding tools such as <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/red.anthropic.com\/2026\/mythos-preview\/\" class=\"c-regularLink\">cloud mythos<\/a> And <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/openai.com\/daybreak\/\" class=\"c-regularLink\">OpenAI Daybreak<\/a>There are AI engines behind most of them, and they are proving to be much faster at finding security problems than human errors. <\/p>\n<p><strong>Too: <\/strong><strong>Linux is getting a security warning &#8211; why it was inevitable and I&#8217;m not worried<\/strong><\/p>\n<p>So this is the latest serious Linux kernel vulnerability, <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/lwn.net\/ml\/all\/8733zvfucm.fsf%40gentoo.org\/\" class=\"c-regularLink\">Fragnesia<\/a>Has emerged. This is the third serious local origin fault in the last two weeks.<\/p>\n<h2>Fragnesia takes root in all major distributions<\/h2>\n<p>Following in the footsteps of Copy Fail and Dirty Frag, this page-cache corruption bug gives disadvantaged users a reliable path to full root control on affected systems. And what are those systems, you ask? According to AlmaLinux, <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/almalinux.org\/blog\/2026-05-13-fragnesia-cve-2026-46300\/\" class=\"c-regularLink\">Fragonia quickly takes root in all major distributions.<\/a> So, basically, <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/cybersecuritynews.com\/fragnesia-linux-vulnerability\/amp\/\" class=\"c-regularLink\">All Linux distros can be targeted and successfully hacked.<\/a> Are we still having fun or what? <\/p>\n<p><strong>Too: <\/strong><strong>Dirty Frag is a new Linux bug that&#8217;s putting your system at risk \u2013 and there&#8217;s no easy solution yet<\/strong><\/p>\n<p> <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/v12sec\/status\/2054491454064746629\" class=\"c-regularLink\">The bug was revealed this week<\/a> by AI Security Company <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.zellic.io\/\" class=\"c-regularLink\">Zelik<\/a>William Bowling and other researchers are using the company <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/v12.sh\/\" class=\"c-regularLink\">AI-Agent Software Auditing Tool, v12<\/a>. It works by abusing a logic bug in Linux XFRM (short for &#8220;transform&#8221;) <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/docs.fortinet.com\/document\/fortigate\/8.0.0\/administration-guide\/351073\/encapsulate-esp-packets-within-tcp-headers\" class=\"c-regularLink\">esp-in-tcp<\/a> Subsystem for writing arbitrary bytes to the kernel page cache of read-only files, without requiring any race conditions. <\/p>\n<p>it <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/fragnesia-linux-kernel-local-privilege-escalation-via-esp-in-tcp\" class=\"c-regularLink\">Local privilege opens the door to growth<\/a> And potentially container runs in a multi-tenant environment. <\/p>\n<p>Unlike classic race-condition exploits, these vulnerabilities allow attackers to precisely corrupt file-backed pages without timing tricks, making attacks more reliable and easier to weaponize once proof-of-concept code is available. <\/p>\n<h2>Proof of concept exploitation exists<\/h2>\n<p>Speaking of which, there already exists a proof-of-concept exploit. This creates a 256-entry lookup table that maps all possible keystream bytes to their corresponding <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.okta.com\/identity-101\/nonce\/#link=%7B%22linkText%22:%22nonces%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.okta.com\/identity-101\/nonce\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D#link={%22role%22:%22standard%22,%22href%22:%22https:\/\/www.okta.com\/identity-101\/nonce\/#link=%7B%22linkText%22:%22nonces%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.okta.com\/identity-101\/nonce\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%22,%22target%22:%22%22,%22absolute%22:%22%22,%22linkText%22:%22nonces%22}\" class=\"c-regularLink\">non<\/a>. The attack then copies a malicious payload, which overwrites the first 192 bytes of the switch user command in the page cache with a short ELF stub that calls setresuid and calls a shell. <\/p>\n<p>In other words, for those of you who are not Linux experts, this will immediately drop the attacker into a root shell. <\/p>\n<p>This is bad, bad news. This means that a local user can obtain superuser (root) privileges. <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.redhat.com\/en\" class=\"c-regularLink\">red hat<\/a> gives it a common vulnerability scoring system <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2026-46300\" class=\"c-regularLink\">(CVSS) score 7.8<\/a>Which makes it a high-level security bug. <\/p>\n<p><strong>Too: <\/strong><strong>This critical Linux vulnerability is putting millions of systems at risk &#8211; how to protect yourself<\/strong><\/p>\n<p>Just as bad, while Fragnesia is technically a local privilege-escalation bug, its impact increases dramatically in modern cloud architectures that run large numbers of untrusted containers on a shared Linux kernel. <\/p>\n<p>Here, if an attacker can run code in a container or restricted user account but still own the namespace and network stack, that person can gain full root access on the host and attack other users&#8217; virtual machines (VMs) or containers from there. <\/p>\n<h2>How to Prune Fragnesia<\/h2>\n<p>Kernel developers and distribution maintainers are now working to harden the ESP-in-TCP code path, with proposed improvements focused on eliminating in-place changes on shared, file-backed pages and tightening segment management. an upstream <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/lore.kernel.org\/netdev\/20260513041635.1289541-1-vakzz@zellic.io\/\" class=\"c-regularLink\">Patch to cure Fragonia<\/a> Now available. But as of May 13, it is not currently shipping in any distro. <\/p>\n<p><strong>Too: <\/strong><strong>Immutable Linux Offers Serious Security \u2013 Here Are Your 5 Best Options<\/strong><\/p>\n<p>In the meantime, you can mitigate this by running the following commands as root: <\/p>\n<p># rmmod esp4 esp6 rxrpc <\/p>\n<p># printf &#8216;esp4 install \/bin\/falsenesp6 \/bin\/false installnrxrpc \/bin\/false installn&#8217; > \/etc\/modprobe.d\/fragnesia.conf <\/p>\n<p>However, if you do this, you will also be out <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.cloudflare.com\/learning\/network-layer\/what-is-ipsec\/\" class=\"c-regularLink\">ipsec<\/a>Which means your Linux Virtual Private Network (VPN) will not work. happy Happy joy joy. <\/p>\n<p>Instead, you can <a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/access.redhat.com\/security\/vulnerabilities\/RHSB-2026-003\" class=\"c-regularLink\">According to Red Hat, run the following command as root<\/a>: : <\/p>\n<p># echo &#8220;user.max_user_namespaces=0&#8221; > \/etc\/sysctl.d\/dirtyfrag.conf sysctl &#8211;system <\/p>\n<p>However, there&#8217;s another problem here: it disables untested user namespaces, which can also affect rootless containers, sandbox browsers, and Flatpak. <\/p>\n<p><strong>Too: <\/strong><strong>Nearly Half of Cybersecurity Professionals Want to Leave a Job \u2013 Here&#8217;s Why<\/strong><\/p>\n<p>It&#8217;s always something!<\/p>\n<h2>Wait for your distro to distribute the patch<\/h2>\n<p>You would be better off waiting for the patch to be distributed by your distro. I know most major distros are already beta-testing patches, and I wouldn&#8217;t be surprised if patched Linux kernels are available by May 14th. Come that day, you should patch your system as quickly as possible. <\/p>\n<h2>Why is this happening? <\/h2>\n<p>I&#8217;ll go into more detail later, but for now suffice it to say that Chris Wright, Red Hat&#8217;s CTO, and I talked about this issue earlier today, and it&#8217;s significantly better than our AI fault detectors, which were even better at finding actual bugs a few weeks ago. <\/p>\n<p>That means:<\/p>\n<ol>\n<li>We can expect many more such security flaws to be discovered in the next few months.<\/li>\n<li>We have to be very quick to fix bugs when we find them. <\/li>\n<\/ol>\n<p><strong>Too: <\/strong><strong>Apple, Google and Microsoft join forces with Anthropic&#8217;s Project Glasswing to protect the world&#8217;s most critical software<\/strong><\/p>\n<p>By the way, this is not a problem exclusive to Linux. This is troublesome for all open-source software, and as AI gets better at reverse-engineering binary code, Windows and other proprietary software developers will also need to upgrade their repair skills. <\/p>\n<\/div>\n<p><script type=\"text\/javascript\">\n      (function() {\n        window.zdconsent = window.zdconsent || {run:(),cmd:(),useractioncomplete:(),analytics:(),functional:(),social:()};\n        window.zdconsent.cmd = window.zdconsent.cmd || ();\n        window.zdconsent.cmd.push(function() {\n          !function(f,b,e,v,n,t,s)\n          {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n          n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n          if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n          n.queue=();t=b.createElement(e);t.async=!0;\n          t.src=v;s=b.getElementsByTagName(e)(0);\n          s.parentNode.insertBefore(t,s)}(window, document,'script',\n          'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n          fbq('set', 'autoConfig', false, '789754228632403');\n          fbq('init', '789754228632403');\n        });\n      })();\n    <\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kerry Wan\/ZDNET Follow ZDNET: Add us as a favorite source On Google. ZDNET Highlights Another nasty Linux kernel bug has surfaced. Fragnesia can grant root powers to unauthorized users. More open-source security bugs are likely to come. according to Linus&#8217;s law&#8220;Given enough attention, all bugs are shallow,&#8221; is fundamental to open source. Unfortunately, thanks to<\/p>\n","protected":false},"author":1,"featured_media":137692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[21643,20607,16869,2335,3957],"class_list":["post-137691","post","type-post","status-publish","format-standard","has-post-thumbnail","category-devotionals","tag-flaw","tag-kernel","tag-linux","tag-major","tag-weeks"],"_links":{"self":[{"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/posts\/137691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/comments?post=137691"}],"version-history":[{"count":1,"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/posts\/137691\/revisions"}],"predecessor-version":[{"id":137693,"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/posts\/137691\/revisions\/137693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/media\/137692"}],"wp:attachment":[{"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/media?parent=137691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/categories?post=137691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/christiancorner.us\/index.php\/wp-json\/wp\/v2\/tags?post=137691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}