Bipko Digital News & Media Platform

collapse
Home / Daily News Analysis / The third major Linux kernel flaw in two weeks has been found - thanks to AI

The third major Linux kernel flaw in two weeks has been found - thanks to AI

May 18, 2026  Twila Rosenbaum  10 views
The third major Linux kernel flaw in two weeks has been found - thanks to AI

The open-source community is facing an unprecedented wave of security vulnerabilities driven by artificial intelligence. The latest, Fragnesia, is the third critical Linux kernel flaw unearthed in just two weeks, following Copy Fail and Dirty Frag. Discovered by the AI security firm Zellic using its V12 auditing tool, Fragnesia exploits a logic bug in the Linux XFRM ESP-in-TCP subsystem to write arbitrary bytes into the kernel page cache of read-only files. This allows a local attacker to escalate privileges to root without requiring any race condition, making the exploit more reliable than traditional attacks.

How Fragnesia Works

Fragnesia abuses a flaw in the way the kernel handles transform operations for IPsec traffic. By sending specially crafted network packets, an unprivileged user can corrupt file-backed pages that should be immutable. The attack builds a lookup table to map encrypted bytes to plaintext, then overwrites the first 192 bytes of the su command in the page cache with a malicious ELF stub. When executed, this stub calls setresuid and spawns a root shell. The proof-of-concept exploit is already circulating, raising the urgency for system administrators.

Impact on All Major Distributions

AlmaLinux confirmed that Fragnieniaeeasily yields root on every major distribution, including Red Hat Enterprise Linux, Ubuntu, Debian, SUSE, and Arch Linux. Red Hat assigned it a CVSS score of 7.8 (High). While the bug is technically a local privilege escalation, its real danger lies in cloud environments where multiple containers share the same kernel. An attacker who gains code execution inside a container or restricted user account can create network namespaces and exploit Fragniea to break out to the host, compromising other containers and virtual machines.

Mitigation options

An upstream patch is available but not yet included in any distribution as of May 13. Two workarounds exist, each with trade-offs. The first removes the vulnerable modules: rmmod esp4 esp6 rxrpc and blacklists them via modprobe. This disables IPsec, breaking Linux VPNs. The second disables unprivileged user namespaces: echo "user.max_user_namespaces=0" > /etc/sysctl.d/dirtyfrag.conf. This prevents rootless containers, sandboxed browsers, and Flatpak from working. Most users are advised to wait for a patched kernel from their distributor, expected by May 14.

Why This Is Happening

The surge in vulnerabilities is directly tied to advances in AI-powered bug detection tools like Claude Mythos and OpenAI Daybreak. These systems can analyze source code and binary code faster than human reviewers, identifying logic flaws that previously went unnoticed. Chris Wright, Red Hat's CTO, explained in an interview that the rate of discovery is now outpacing the rate of patching. The development community is scrambling to fix bugs as quickly as they appear.

Broader Implications for Open Source

Linus's law that "given enough eyeballs, all bugs are shallow" assumed human eyeballs. AI eyeballs are far more efficient at scanning massive codebases. This means many more latent vulnerabilities will surface in the coming months—not just in Linux, but in other open-source projects like OpenSSL, Apache, and systemd. As AI also improves at reverse-engineering proprietary binaries, Windows and MacOS may face similar challenges. The entire software industry must accelerate its patching workflows and adopt automated remediation to keep pace.

What System Administrators Should Do

Until an official patch is applied, administrators should monitor for unusual activity in /var/log/messages and dmesg for signs of page cache corruption. Containerized environments should enforce strict namespace isolation and consider disabling unprivileged user namespaces if the impact is acceptable. The long-term solution is to adopt immutable Linux distributions that minimize attack surface and allow rapid, atomic updates.

The Fragnieniae bug is a clear warning: AI is changing the cybersecurity landscape faster than anyone anticipated. Those who ignore the trend will find their systems compromised. The only way forward is to embrace faster patching cycles, invest in automated security testing, and accept that traditional vulnerability disclosure timelines are now obsolete.


Source: ZDNET News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy