logoalt Hacker News

Claude Code Found a Linux Vulnerability Hidden for 23 Years

357 pointsby eichinlast Friday at 11:46 PM234 commentsview on HN

Comments

mattbeeyesterday at 12:35 PM

Pasting a big batch of new code and asking Claude "what have I forgotten? Where are the bugs?" is a very persuasive on-ramp for developers new to AI. It spots threading & distributed system bugs that would have taken hours to uncover before, and where there isn't any other easy tooling.

I bet there's loads of cryptocurrency implementations being pored over right now - actual money on the table.

show 4 replies
userbinatoryesterday at 9:46 AM

Not "hidden", but probably more like "no one bothered to look".

declares a 1024-byte owner ID, which is an unusually long but legal value for the owner ID.

When I'm designing protocols or writing code with variable-length elements, "what is the valid range of lengths?" is always at the front of my mind.

it uses a memory buffer that’s only 112 bytes. The denial message includes the owner ID, which can be up to 1024 bytes, bringing the total size of the message to 1056 bytes. The kernel writes 1056 bytes into a 112-byte buffer

This is something a lot of static analysers can easily find. Of course asking an LLM to "inspect all fixed-size buffers" may give you a bunch of hallucinations too, but could be a good starting point for further inspection.

show 3 replies
altern8yesterday at 9:56 PM

Every time I read these titles, I wonder if people are for some reason pushing the narrative that Claude is way smarter than it really is, or if I'm using it wrong.

They want me to code AI-first, and the amount of hallucinations and weird bugs and inconsistencies that Claude produces is massive.

Lots of code that it pushes would NOT have passed a human/human code review 6 months ago.

show 3 replies
DGAPyesterday at 2:37 PM

I replicated this experiment on several production codebases and got several crits. Lots of dupes, lots of false positives, lots of bugs that weren't actually exploitable, lots of accepted/ known risks. But also, crits!

fguerrazyesterday at 6:52 PM

Interestingly, I think 3 or 4 out of the 5 bugs would have been prevented / mitigated quite well using https://github.com/anthraxx/linux-hardened patches...

(disabled io_uring, would have crashed the kernel on UAF, and made exploitation of the heap overflow very unreliable)

PeterStueryesterday at 5:12 PM

Those 3 letter agencies are going to see their stash of 0-days dwindle so hard.

summarityyesterday at 11:14 AM

Related work from our security lab:

Stream of vulnerabilities discovered using security agents (23 so far this year): https://securitylab.github.com/ai-agents/

Taskflow harness to run (on your own terms): https://github.blog/security/how-to-scan-for-vulnerabilities...

e12eyesterday at 6:34 PM

I wonder about the "video running in the background" during qna of the talk:

https://youtu.be/1sd26pWhfmg?is=XLJX9gg0Zm1BKl_5

Did he write an exploit for the NFS bug that runs via network over USB? Seems to be plugging in a SoC over USB...?

misiek08yesterday at 12:53 PM

Do not expect so many more reports. Expect so many more attacks ;)

dist-epochyesterday at 9:57 AM

> "given enough eyeballs, all bugs are shallow"

Time to update that:

"given 1 million tokens context window, all bugs are shallow"

show 3 replies
cesarefyesterday at 12:22 PM

I'm interested in the implications for the open source movement, specifically about security concerns. Anyone know is there has been a study about how well Claude Code works on closed source (but decompiled) source?

show 1 reply
eichinlast Friday at 11:46 PM

An explanation of the Claude Opus 4.6 linux kernel security findings as presented by Nicholas Carlini at unpromptedcon.

show 1 reply
rixraxyesterday at 2:14 PM

I hope next up is the performance and bloat that the LLMs can try and improve.

Especially on perf side I would wager LLMs can go from meat sacks what ever works to how do I solve this with best available algorithm and architecture (that also follows some best practises).

jazz9kyesterday at 12:25 AM

This does sound great, but the cost of tokens will prevent most companies from using agents to secure their code.

show 4 replies
skeeter2020yesterday at 3:28 PM

And with AI generating vulnerabilities at an accelerated pace this business is only getting bigger. Welcome to the new antivirus!

show 1 reply
alsanan2yesterday at 1:30 PM

making public that AI is able of founding that kind of vulnerabilities is a big problem. In this case it's nice that the vulnerability has been closed before publishing but in case a cracker founds it, the result would be extremately different. This kind of news only open eyes for the crackers.

redohyesterday at 9:53 PM

[dead]

jeremie_strandyesterday at 6:04 PM

[dead]

jason1choyesterday at 10:31 AM

This isn't surprising. What is not mentioned is that Claude Code also found one thousand false positive bugs, which developers spent three months to rule out.

show 14 replies
jeremie_strandyesterday at 3:09 PM

[dead]

adamsilvaconsyesterday at 12:51 PM

[dead]

LeonTing1010yesterday at 11:03 AM

[dead]

dfir-labyesterday at 4:39 PM

[dead]

pithtknyesterday at 1:07 PM

[dead]

claudexaiyesterday at 4:16 PM

[dead]

roach54023yesterday at 1:32 PM

[dead]

lnklyesterday at 11:06 AM

[flagged]

show 1 reply
yunnppyesterday at 6:29 PM

I really "like" the premise of this talk: "We are releasing dangerous weapons, help us make the world safer! Also, it'll cost you a subscription, and we'll profit from it." Imagine if the speaker was a biochemist talking about releasing chemical bombs in your neighborhood that somehow you just could not avoid. The software industry is such a joke right now.

show 1 reply
cookiengineeryesterday at 10:33 AM

> Nicholas has found hundreds more potential bugs in the Linux kernel, but the bottleneck to fixing them is the manual step of humans sorting through all of Claude’s findings

No, the problem is sorting out thousands of false positives from claude code's reports. 5 out of 1000+ reports to be valid is statistically worse than running a fuzzer on the codebase.

Just sayin'

show 2 replies
up2isomorphismyesterday at 2:42 AM

But on the other hand, Claude might introduce more vulnerability than it discovered.

show 2 replies
desireco42yesterday at 3:00 PM

A developer using Claude Code found this bug. Claude is a tool. It is used by developers. It should not sign commits. Neovim never tried to sign commits with me, nor Zed.

show 1 reply
_pdp_yesterday at 10:21 AM

The title is a little misleading.

It was Opus 4.6 (the model). You could discover this with some other coding agent harness.

The other thing that bugs me and frankly I don't have the time to try it out myself, is that they did not compare to see if the same bug would have been found with GPT 5.4 or perhaps even an open source model.

Without that, and for the reasons I posted above, while I am sure this is not the intention, the post reads like an ad for claude code.

show 3 replies
skyskysyesterday at 6:15 PM

no hecking wayyy!!!! claude chud code!!!