Home

Claude Code Found a Linux Vulnerability Hidden for 23 Years

$$21818
https://programming.dev/u/codeinabox posted on Apr 3, 2026 15:24
https://programming.dev/post/48230001
Reply
$$21819
https://lemmy.dbzer0.com/u/ATS1312 posted on Apr 3, 2026 15:58
In reply to: https://programming.dev/post/48230001

Real vulnerability or hallucinated?

https://lemmy.dbzer0.com/comment/25332955
Reply
$$21824
https://beehaw.org/u/TehPers posted on Apr 3, 2026 16:15
In reply to: https://programming.dev/post/48230001

My favorite kind of graphs are ones where an entire axis is unlabeled:

bugs found vs LLM model:https://beehaw.org/pictrs/image/0c03577f-62fa-4df5-846a-d283fa749bf0.png

You see this a lot with marketing graphs. They say nothing, but they’re designed to convince you that the graphs mean something.

Anyway, it’s neat they found and fixed, supposedly, some real bugs. I’m curious how many fake reports they had to sift through to find any real ones.

https://beehaw.org/comment/5741202
Reply
$$21825
https://lemmy.blahaj.zone/u/RushLana posted on Apr 3, 2026 16:15
In reply to: https://lemmy.dbzer0.com/comment/25332955

Given Nicholas Carlini work at anthropic I would wait for another person to confirm this.

The research method is just pointing file by file and asking an LLM if any vulnerability exist and reminds me of the person who bugged ffmpeg devs with vulnerabilities on niche non enabled codec decryption.

https://lemmy.blahaj.zone/comment/19922755
Reply
$$21830
https://lemmy.zip/u/illusionist posted on Apr 3, 2026 16:31
In reply to: https://beehaw.org/comment/5741202

He writes 100

https://lemmy.zip/comment/25674773
Reply
$$21832
https://piefed.zip/u/INeedMana posted on Apr 3, 2026 16:42
In reply to: https://programming.dev/post/48230001

I can’t report because I haven’t validated them yet… I’m not going to send [the Linux kernel maintainers] potential slop

That’s worth pointing out IMO

https://piefed.zip/comment/4587760
Reply
$$21845
https://lemmy.sdf.org/u/lambalicious posted on Apr 3, 2026 17:31
In reply to: https://programming.dev/post/48230001

If I ever received a vuln report from an AI, or other such glorified spreadsheet, I would promptly dismiss it then wait for a human to organically discover it on its own to consider that as proof of actual existence.

https://lemmy.sdf.org/comment/27050551
Reply
$$21861
https://reddthat.com/u/far_university1990 posted on Apr 3, 2026 17:57
In reply to: https://lemmy.blahaj.zone/comment/19922755

reminds me of the person who bugged ffmpeg devs with vulnerabilities on niche non enabled codec decryption.

That was google.

https://itsfoss.com/news/ffmpeg-google-fiasco/

https://reddthat.com/comment/25824619
Reply
$$21863
https://programming.dev/u/codeinabox posted on Apr 3, 2026 18:00
In reply to: https://piefed.zip/comment/4587760

Though that quote is followed by this, which indicates at least five of those vulnerabilities were real:

I searched the Linux kernel and found a total of five Linux vulnerabilities so far that Nicholas either fixed directly or reported to the Linux kernel maintainers, some as recently as last week:

https://programming.dev/comment/23095442
Reply
$$21880
https://sh.itjust.works/u/Pika posted on Apr 3, 2026 19:54
In reply to: https://lemmy.sdf.org/comment/27050551

If the bug was actually legitimate, and was verified, I don’t think its a good idea to just wait till someone actually experiences it.

Of course this depends on the severity of the bug as well. In the case of this article, he was refusing to submit anything until he actually verified it, but he defo was using the AI as a origin of discovery.

I would prefer those types of reports over blanket AI vulnerability reports that aren’t proven. Discrediting a valid bug because it was not human generated may lessen workflow, but it’s at the cost of your software’s security and reliability.

I agree I would throw out reports that are AI driven & not proven, but if someone did the actual PoC and demonstrated actual risk I wouldn’t care if it was originally AI or not.

https://sh.itjust.works/comment/24653137
Reply
$$21900
https://programming.dev/u/entwine posted on Apr 3, 2026 21:33
In reply to: https://programming.dev/comment/23095442

I wonder how true that is. The author of this blog post seems to just be taking this guy’s word for it. Did Anthropic actually confirm the bug exists by trying to trigger it on real systems, or are they assuming it’s real because it looks plausible? The report claims you cam do it with two cooperating NFS clients, so did they actually do that, or are they just assuming it’ll work?

https://programming.dev/comment/23099121
Reply
$$21903
https://piefed.world/u/chocrates posted on Apr 3, 2026 21:41
In reply to: https://programming.dev/post/48230001

I’m really scared about what AI is going to do to the world, but I think it’s here to stay.
Hopefully it’s actually finding real bugs

https://piefed.world/comment/4596738
Reply
$$21920
https://lemmy.world/u/FauxLiving posted on Apr 4, 2026 00:37
In reply to: https://sh.itjust.works/comment/24653137

Letting your users get hacked just to own the AIs is certainly a strategy.

https://lemmy.world/comment/23034098
Reply
$$21910
https://kbin.melroy.org/u/melroy posted on Apr 4, 2026 00:58
In reply to: https://lemmy.dbzer0.com/comment/25332955

Confirmed bugs.

https://kbin.melroy.org/m/linux@programming.dev/t/1612936/-/comment/11773006
Reply
$$22011
https://beehaw.org/u/luciole posted on Apr 4, 2026 12:57
In reply to: https://programming.dev/post/48230001

This would be meaningful if the findings were not produced by the corp trying to sell you the product being hyped. Big tech has a history of “faking it till you make it” and I can’t help but doubt that this is really just Claude Code mostly autonomously finding issues.

https://beehaw.org/comment/5743378
Reply