Follow ZDNET: Add america arsenic a preferred source connected Google.
ZDNET's cardinal takeaways
- Another atrocious Linux kernel bug has appeared.
- Fragnesia tin springiness unauthorized users basal powers.
- More open-source information bugs are apt coming.
According to Linus's law, "Given capable eyeballs, each bugs are shallow," is cardinal to unfastened source.
Unfortunately, acknowledgment to AI bug-finding tools, specified arsenic Claude Mythos and OpenAI Daybreak, down astir of those eyeballs are AI engines, and they're proving to beryllium overmuch faster astatine uncovering information problems than quality ones.
Also: Linux is getting a information wake-up telephone - wherefore it was inevitable and I'm not worried
So it is the latest superior Linux kernel vulnerability, Fragnesia, has emerged. It's the 3rd superior section basal flaw successful the past 2 weeks.
Fragnesia yields basal connected each large distributions
Following successful the footsteps of Copy Fail and Dirty Frag, this page-cache corruption bug gives unprivileged users a reliable way to afloat basal power connected affected systems. And what are those systems, you ask? According to AlmaLinux, Fragnesia instantly yields basal connected each large distributions. So, essentially, all Linux distros tin beryllium targeted and successfully hacked. Are we having amusive yet oregon what?
The bug was disclosed this week by the AI information institution Zellic, with William Bowling and different researchers utilizing the company's AI-agentic bundle auditing tool, V12. It works by abusing a logic bug successful the Linux XFRM (short for "transform") ESP-in-TCP subsystem to constitute arbitrary bytes into the kernel leafage cache of read-only files, without requiring immoderate contention condition.
This opens the doorway to section privilege escalation and imaginable instrumentality escapes successful multi-tenant environments.
Unlike classical race-condition exploits, these vulnerabilities let attackers to precisely corrupt file-backed pages without timing tricks, making attacks much reliable and easier to weaponize erstwhile proof-of-concept codification is available.
A proof-of-concept exploit exists
Speaking of which, determination already exists a proof-of-concept exploit. It builds a 256-entry lookup array that maps each imaginable keystream bytes to their corresponding nonces. The onslaught past copies a malicious payload, which overwrites the archetypal 192 bytes of the power idiosyncratic bid successful the leafage cache with a tiny ELF stub that calls setresuid and calls a shell.
In different words, for those of you who aren't Linux experts, it volition instantly driblet the attacker into a basal shell.
This is bad, atrocious news. It means a section idiosyncratic could summation superuser (root) privileges. Red Hat gives it a Common Vulnerability Scoring System (CVSS) people of 7.8, which makes it a high-level information bug.
Just arsenic bad, portion Fragnesia is technically a section privilege-escalation bug, its interaction scales dramatically successful modern unreality architectures that tally ample numbers of untrusted containers connected shared Linux kernels.
Here, if an attacker tin tally codification successful a instrumentality oregon a restricted idiosyncratic relationship but inactive make namespaces and web stacks, that idiosyncratic could interruption retired to afloat basal connected the big and, from there, onslaught different users' virtual machines (VMs) oregon containers.
How to mitigate Fragnesia
Kernel developers and organisation maintainers are present moving to harden the ESP-in-TCP codification path, with projected fixes focusing connected eliminating in-place transformations connected shared, file-backed pages and tightening fragment handling. An upstream patch to hole Fragnesia is disposable now. But it's not presently shipping successful immoderate distro arsenic of May 13.
Also: Immutable Linux delivers superior information - present are your 5 champion options
In the meantime, you tin mitigate it by moving the pursuing bid arsenic root:
# rmmod esp4 esp6 rxrpc
# printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/fragnesia.conf
However, if you bash so, you'll besides sound retired IPsec, which means your Linux virtual backstage networks (VPNs) won't work. Happy, happy, joy, joy.
You can, instead, according to Red Hat, tally the pursuing bid arsenic root:
# echo "user.max_user_namespaces=0" > /etc/sysctl.d/dirtyfrag.conf sysctl --system
Here, however, there's different problem: It disables unprivileged idiosyncratic namespaces, which whitethorn besides impact rootless containers, sandboxed browsers, and Flatpak.
Also: Nearly fractional of cybersecurity pros privation to discontinue - here's why
It's ever something!
Wait for your distro to present a patch
You mightiness beryllium amended disconnected conscionable waiting for your distro to present a patch. I cognize astir large distros are already beta-testing the patch, and I wouldn't beryllium amazed if patched Linux kernels are disposable by May 14. Come that day, you should spot your systems ASAP.
Why is this happening?
I'll beryllium going into much item later, but for now, suffice it to accidental that Chris Wright, Red Hat's CTO, and I spoke astir this precise contented earlier today, and it boils down to our AI responsibility detectors being overmuch amended than they were adjacent a fewer weeks agone astatine uncovering existent bugs.
That means:
- We tin expect to spot galore much specified information holes being discovered successful the adjacent fewer months.
- We're going to request to get a batch faster astatine fixing bugs arsenic they appear.
This, by the way, isn't conscionable a occupation for Linux. It's troublesome for each open-source software, and arsenic AI gets amended astatine reverse-engineering binary code, Windows and different proprietary bundle developers volition request to upgrade their repair skills arsenic well.

3 hours ago
9







English (US) ·