Linux kernel bugs can hide for up to 20 years

A security researcher has found that bugs in the Linux kernel often remain undetected for more than two years on average, with some persisting for over two decades. By analyzing 20 years of kernel development, Jenny Guanni Qu uncovered how these flaws quietly affect cloud systems, enterprises, and billions of devices. Her work highlights the challenges of maintaining secure open-source software.

Linux security developer Jenny Guanni Qu has revealed that vulnerabilities in the Linux kernel can lurk undetected for extended periods, posing significant risks to widespread systems. In a comprehensive study, she examined two decades of Linux kernel development, reviewing 125,000 bug-fix commits. The analysis showed that the average bug stays hidden for just over two years, though many endure far longer—some exceeding 20 years.

One striking example is a networking bug introduced in 2006 and only fixed in 2025, nearly 19 years later. This issue, a reference-count leak in the netfilter subsystem, stemmed from a commit intended to resolve a deadlock. "The irony: Commit d205dc40798d was itself a fix: '[NETFILTER]: ctnetlink: fix deadlock in table dumping'. Patrick McHardy was fixing a deadlock by removing a _put() call. In doing so, he introduced a refcount leak that would persist for 19 years," Qu explained. The bug caused slow memory leaks under specific conditions, allowing affected systems to seem stable for years before degrading under load.

Qu's research points to why such long-lived bugs are hard to detect. Older kernel sections, dating to the early 2000s, rarely see changes or reviews. Partial fixes often address symptoms without tackling root causes, letting exploits survive. Race conditions, reference-count errors, and memory lifecycle issues prove especially elusive.

Despite Linux's open-source model, which invites scrutiny, a backlog of ancient flaws remains. From an attacker's view, these bugs offer powerful vectors, affecting shared code across distributions. By the time a vulnerability earns a CVE, it may have been exploited for years.

To combat this, Qu developed VulnBERT, a machine-learning model that scans code changes for vulnerabilities. In tests, it detected over 90% of problematic commits with low false positives, including the 19-year-old bug. "VulnBERT is a triage tool, not a guarantee. It catches 92% of bugs with recognizable patterns. The remaining 8% and novel bug classes still need human review and fuzzing," she noted.

Newer kernels benefit from faster fixes, but ongoing discoveries in legacy code underscore the need for vigilant maintenance. Enterprises should prioritize kernel updates, as these flaws can enable full system compromises in advanced attacks.

Связанные статьи

Illustration depicting Linux kernel maintainers extending LTS support timelines in a server room, symbolizing reversed cutbacks and enhanced stability for servers and devices.
Изображение, созданное ИИ

Linux kernel extends LTS support for multiple releases, easing prior burnout-driven cutbacks

Сообщено ИИ Изображение, созданное ИИ

Linux kernel maintainers have extended long-term support (LTS) for several key releases through 2026-2028, partially reversing a 2023 decision to limit support to two years amid contributor burnout. Stable maintainer Greg Kroah-Hartman updated the schedule following feedback from users, vendors, and fellow maintainer Sasha Levin, providing more time for security fixes in servers, Android devices, and appliances.

A new analysis of 20 years of Linux kernel development reveals that bugs often remain undetected for years, with an average lifespan of 2.1 years before discovery. The research, conducted by Pebblebed's Jenny Guanni Qu, highlights variations across kernel components and the prevalence of incomplete fixes. Some vulnerabilities persisted for over two decades.

Сообщено ИИ

Linux systems face significant risks from unpatched vulnerabilities, challenging the notion of their inherent security. Experts emphasize the need for automated patch management to protect open-source enterprises effectively.

Linus Torvalds announced Linux kernel 6.18 on the last Sunday of November 2025, marking the final release of the year. The kernel has been officially designated as a long-term support version, with maintenance promised until December 2027. It includes various hardware improvements, file system enhancements, and new features like the Rust Binder driver.

Сообщено ИИ

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

The Linux kernel project has introduced a formal continuity plan to address leadership transitions, particularly if creator Linus Torvalds steps away. Drafted by Dan Williams, the document outlines a swift process involving key community figures to ensure ongoing development. This move follows discussions at recent summits amid concerns over an aging maintainer base.

Сообщено ИИ

After more than 34 years, the Linux kernel community has outlined a preliminary contingency plan to replace creator Linus Torvalds as its maintainer. The initiative, described as a 'plan for a plan,' follows discussions at the 2025 Maintainers Summit amid concerns over an aging core group of contributors. It aims to ensure smooth transitions for the project's leadership.

 

 

 

Этот сайт использует куки

Мы используем куки для анализа, чтобы улучшить наш сайт. Прочитайте нашу политику конфиденциальности для дополнительной информации.
Отклонить