Linux kernel bugs can hide for up to 20 years

A security researcher has found that bugs in the Linux kernel often remain undetected for more than two years on average, with some persisting for over two decades. By analyzing 20 years of kernel development, Jenny Guanni Qu uncovered how these flaws quietly affect cloud systems, enterprises, and billions of devices. Her work highlights the challenges of maintaining secure open-source software.

Linux security developer Jenny Guanni Qu has revealed that vulnerabilities in the Linux kernel can lurk undetected for extended periods, posing significant risks to widespread systems. In a comprehensive study, she examined two decades of Linux kernel development, reviewing 125,000 bug-fix commits. The analysis showed that the average bug stays hidden for just over two years, though many endure far longer—some exceeding 20 years.

One striking example is a networking bug introduced in 2006 and only fixed in 2025, nearly 19 years later. This issue, a reference-count leak in the netfilter subsystem, stemmed from a commit intended to resolve a deadlock. "The irony: Commit d205dc40798d was itself a fix: '[NETFILTER]: ctnetlink: fix deadlock in table dumping'. Patrick McHardy was fixing a deadlock by removing a _put() call. In doing so, he introduced a refcount leak that would persist for 19 years," Qu explained. The bug caused slow memory leaks under specific conditions, allowing affected systems to seem stable for years before degrading under load.

Qu's research points to why such long-lived bugs are hard to detect. Older kernel sections, dating to the early 2000s, rarely see changes or reviews. Partial fixes often address symptoms without tackling root causes, letting exploits survive. Race conditions, reference-count errors, and memory lifecycle issues prove especially elusive.

Despite Linux's open-source model, which invites scrutiny, a backlog of ancient flaws remains. From an attacker's view, these bugs offer powerful vectors, affecting shared code across distributions. By the time a vulnerability earns a CVE, it may have been exploited for years.

To combat this, Qu developed VulnBERT, a machine-learning model that scans code changes for vulnerabilities. In tests, it detected over 90% of problematic commits with low false positives, including the 19-year-old bug. "VulnBERT is a triage tool, not a guarantee. It catches 92% of bugs with recognizable patterns. The remaining 8% and novel bug classes still need human review and fuzzing," she noted.

Newer kernels benefit from faster fixes, but ongoing discoveries in legacy code underscore the need for vigilant maintenance. Enterprises should prioritize kernel updates, as these flaws can enable full system compromises in advanced attacks.

Relaterte artikler

Illustration of Linus Torvalds announcing Linux kernel 6.18 LTS release with Tux penguin, kernel code, and feature icons in a conference setting.
Bilde generert av AI

Linux kernel 6.18 released as long-term support version

Rapportert av AI Bilde generert av AI

Linus Torvalds announced Linux kernel 6.18 on the last Sunday of November 2025, marking the final release of the year. The kernel has been officially designated as a long-term support version, with maintenance promised until December 2027. It includes various hardware improvements, file system enhancements, and new features like the Rust Binder driver.

A new analysis of 20 years of Linux kernel development reveals that bugs often remain undetected for years, with an average lifespan of 2.1 years before discovery. The research, conducted by Pebblebed's Jenny Guanni Qu, highlights variations across kernel components and the prevalence of incomplete fixes. Some vulnerabilities persisted for over two decades.

Rapportert av AI

Linux systems face significant risks from unpatched vulnerabilities, challenging the notion of their inherent security. Experts emphasize the need for automated patch management to protect open-source enterprises effectively.

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

Rapportert av AI

In a notable development following Rust's expanding role in the Linux kernel—including the native Binder IPC rewrite for Android—the first vulnerability in kernel Rust code has been reported: a race condition in the Android Binder driver affecting kernel 6.18+.

Following performance boosts in Linux 6.19, developers plan additional improvements for older AMD graphics cards, with updates arriving throughout 2026 to ensure long-term compatibility in open-source environments.

Rapportert av AI

The Linux developer community has shifted from debating AI's role to integrating it into kernel engineering processes. Developers now use AI for project maintenance, though questions persist about writing code with it. Concerns over copyright and open-source licensing remain.

 

 

 

Dette nettstedet bruker informasjonskapsler

Vi bruker informasjonskapsler for analyse for å forbedre nettstedet vårt. Les vår personvernerklæring for mer informasjon.
Avvis