Study uncovers long-hidden bugs in Linux kernel

A new analysis of 20 years of Linux kernel development reveals that bugs often remain undetected for years, with an average lifespan of 2.1 years before discovery. The research, conducted by Pebblebed's Jenny Guanni Qu, highlights variations across kernel components and the prevalence of incomplete fixes. Some vulnerabilities persisted for over two decades.

The Linux kernel, a cornerstone of open-source operating systems, is not immune to persistent bugs, according to a detailed study published on January 8, 2026. Jenny Guanni Qu, a researcher at Pebblebed, examined 125,183 bugs spanning from April 2005 to January 2026, using data from Linux kernel version 6.19-rc3.

Her methodology relied on the 'Fixes:' tag in git commits, which links fixes to the original introducing commits. A custom tool extracted these tags, calculating bug lifespans based on commit dates. Of the records, 119,449 were unique fixes from 9,159 authors, with only 158 assigned CVE IDs.

Key findings include an average bug detection time of 2.1 years. The longest undetected issue—a buffer overflow in networking code—lasted 20.7 years. Component variations are stark: CAN bus drivers averaged 4.2 years, SCTP networking 4.0 years, while GPU bugs were caught in 1.4 years and BPF bugs in 1.1 years.

The study also notes common incomplete fixes. For instance, a 2024 netfilter set field validation patch was bypassed a year later by a security researcher. This underscores ongoing challenges despite progress, such as the recent first Rust CVE amid 159 C-code CVEs on the same day.

Qu further developed VulnBERT, an AI model to predict vulnerability-introducing commits, offering potential for earlier detection in kernel development.

Связанные статьи

Illustration depicting Linux kernel maintainers extending LTS support timelines in a server room, symbolizing reversed cutbacks and enhanced stability for servers and devices.
Изображение, созданное ИИ

Linux kernel extends LTS support for multiple releases, easing prior burnout-driven cutbacks

Сообщено ИИ Изображение, созданное ИИ

Linux kernel maintainers have extended long-term support (LTS) for several key releases through 2026-2028, partially reversing a 2023 decision to limit support to two years amid contributor burnout. Stable maintainer Greg Kroah-Hartman updated the schedule following feedback from users, vendors, and fellow maintainer Sasha Levin, providing more time for security fixes in servers, Android devices, and appliances.

Greg Kroah-Hartman has extended the projected end-of-life dates for several active Linux long-term support kernels following discussions with companies and co-maintainer Sasha Levin. This update provides longer support windows for kernels like 6.6, 6.12, and 6.18. The change offers more time for users relying on these stable releases.

Сообщено ИИ

The Linux and open-source world saw a flurry of updates from February 9 to 15, 2026, including new versions of major distributions and software tools. Key highlights feature the Linux Kernel 6.19 and various desktop environment fixes. These releases focus on bug resolutions, performance improvements, and new features for users and developers.

Four days after the CopyFail (CVE-2026-31431) exploit disclosure disrupted Ubuntu services, the US government warned of its critical risks to Linux systems, urging immediate patching amid public exploit code.

Сообщено ИИ

A security researcher has disclosed Dirty Frag, a new Linux kernel exploit that allows local users to gain root privileges. The flaw affects major distributions and remains unpatched on most systems despite earlier fixes for a similar issue.

Этот сайт использует куки

Мы используем куки для анализа, чтобы улучшить наш сайт. Прочитайте нашу политику конфиденциальности для дополнительной информации.
Отклонить