Dirty Frag, Copy Fail, Fragnesia: A Worrisome Linux Security Trend

Timofeibu2 pts0 comments

Dirty Frag, Copy Fail, Fragnesia: The start of a worrisome Linux security trend

Jump to main content

Search

REG AD

Security

Dirty Frag, Copy Fail, Fragnesia: The start of a worrisome Linux security trend

Or is it just life today, with AI constantly digging through code repositories in search of security holes?

Steven J. Vaughan-Nichols

Steven<br>J. Vaughan-Nichols

Published<br>sat 23 May 2026 // 11:59 UTC

OPINION Dirty Frag, Copy Fail, and Fragnesia are less a random cluster of Linux bugs and more the public unveiling of how AI tools can pry open security holes with just a prompt or two. What they also have in common is their shared abuse of a core kernel abstraction: The page cache. What does this mean for you and me? Is this the rainstorm before a downpour of killer Linux security problems, or is this just a shower? It depends on who you ask.<br>Whatever else may be true, these problems must be addressed. As Igor Seletskiy, CEO of CloudLinux, said: "The real story here is that we typically see one or two kernel-level LPE (Linux privilege escalations) vulnerabilities that affect multiple distros/versions per year. And now we see two such vulnerabilities one week apart. We should expect this trend to continue for quite a few months, meaning companies might have to reboot servers weekly."<br>Ouch!

REG AD

But is this the start of a trend? Linus Torvalds, who knows a thing or two about Linux, said at Open Source Summit North America in Minneapolis that until recently, the kernel community would quietly notify distributions about a bug and ask them to upgrade without detailing the vulnerability, and "most of the time, nobody would figure out what happened." That was then. This is now. With AI‑accelerated analysis, he recalled that "last week, we fixed the bug; within three hours, there was a blog post about the implications of that bug fix, because security people love getting attention."

REG AD

As a result of this kind of thing, Torvalds has changed how the Linux security community will deal with AI-discovered security holes. "AI-detected bugs are pretty much by definition not secret, and treating them on some private list is a waste of time for everybody involved – and only makes that duplication worse because the reporters can't even see each other's reports."<br>In addition, Torvalds added, in the case of AI-discovered bugs, you need to keep in mind that just "because you found it with AI, 100 other people also found it with AI."<br>That means we're going to hear a lot more about Linux security problems. But are they getting worse? I asked Greg Kroah-Hartman, the Linux stable kernel maintainer, and he told me: "Maybe? It's hard to tell; the 'recent' ones really are very minor, as the number of systems that have 'untrusted users' is not common anymore. I don't see any real uptick in our actual bug fixes that I can tell."<br>He continued: "We fix bugs like that on a daily basis, it's just the rise of people wanting to 'name a bug' and release a public exploit seems to be all the rage at the moment."<br>An important point that Chris Wright, Red Hat's CTO, made at Red Hat Summit, the week before, is that in "security, all things aren't created equal. There will always be a spectrum of vulnerabilities that will surface. Some of those will be really critical and we will need to respond very quickly, so that becomes a clear priority. Others will have a longer tail of lower severity."

MORE CONTEXT

Trump jumps from 'anything goes' to 'strict regulation' AI policy

Locked, stocked, and losing budget: AI vendor lock-in bites back

Project Glasswing and open source software: The good, the bad, and the ugly

Open source isn't a tip jar – it's time to charge for access

Torvalds also added at Open Source Summit that just because you read stories about Linux and AI-discovered bugs, you shouldn't think the same thing isn't happening to proprietary software, such as Windows. "If you think that AI can't reverse engineer closed source, you're in for a surprise." In fact, he warned, "closed source is even worse in this respect, because the AI can't help you fix those problems, but the AI sure can help find those problems in the first place."<br>He also discouraged security researchers from publishing working exploits: "When it comes to things that really are security issues, you may not want to make the exploit public… Don't be that guy who then crows about it publicly and says, 'Look, I could bring down this big company.'"<br>Following on this theme, Christopher "CRob" Robinson, chief security architect for the Open Source Software Foundation (OpenSSF), told The Register that thanks to AI, "roughly 30 percent of reported Linux security bugs were duplicates. That's going to be another problem in this AI age, where everybody's a researcher, right, with a $20 cloud code account." That, in turn, will burden already overworked maintainers with yet more patches to deal with.

REG AD

Linux, Torvalds added, is something that its maintainers can...

security linux source bugs open trend

Related Articles