BETA — Сайт у режимі бета-тестування. Можливі помилки та зміни.
UK | EN |
LIVE
Технології 🇺🇸 США

Linux is getting a security wake-up call - why it was inevitable and I'm not worried

ZDNet 1 переглядів 7 хв читання
Tech Home Tech Services & Software Operating Systems Linux Linux is getting a security wake-up call - why it was inevitable and I'm not worried Serious Linux vulnerabilities, like Copy Fail and Dirty Frag, are becoming more common. Here's why, and how the Linux development community is responding. jack-wallen Written by Jack Wallen, Contributing WriterContributing Writer May 11, 2026 at 8:12 a.m. PT
Linux is getting a security wake-up call - why it was inevitable and I'm not worried
Jack Wallen / ZDNET

ZDNET key takeaways

  • There's been a rise in Linux vulnerabilities.
  • There are clear reasons why this is happening.
  • Fortunately, the kernel development community is taking action.

For decades, I've been reporting that Linux is the most secure operating system available. Although I still believe that to be true, such security is no longer guaranteed. In the span of a week, two dangerous vulnerabilities have been discovered: Copy Fail and Dirty Frag. Each of these flaws carries serious ramifications for users, admins, and organizations.

Also: 6 reasons a minimal Linux install might be the smartest move you make

For some users, it's like discovering their favorite breakfast cereal wasn't cereal at all, but a bowl full of marbles and bearings. It's a shock .But should it be? Let me first submit to you why I believe this was inevitable.

The why

When I started using Linux in the late 1990s, the idea that Linux could be hacked was laughable. 

I was 100% sure that the OS on my desktop was impenetrable. Over the past decades, I've only experienced one instance where a Linux machine was breached, and that was a poorly managed server I inherited to take care of. A rootkit had been installed, and the only way I could resolve the issue was to reinstall the OS and all of the software in use.

That was it... and it helped to strengthen my belief that no one could conquer Linux security.

The thing is, for the longest time, Linux lived under the protection of obscurity. Back then, few people even knew about Linux. Because Linux was rarely used, hackers had no reason to target it. 

However, over the years, something important happened: Linux grew in popularity.

Also: Thinking about switching to Linux? 10 things you need to know

First off, every enterprise organization around the world depends on Linux. Linux runs the cloud, AI, your smart fridge... You name it, and Linux is in it. Add to that the rise in Linux gaming, thanks to Steam, and Linux's popularity is higher than ever.

Along with that popularity comes a target, and that target means more and more bad actors are finding vulnerabilities to exploit.

The how

One bit of technology that gives hackers a leg up is AI. 

Prior to AI, hackers would have to scour the Linux kernel code to find a weakness to use against the operating system. Now, they can feed bits of code into AI and locate vulnerabilities that have been in the kernel for years in seconds or minutes.

Also: I've used Windows for decades, but I tried Linux to see if it's truly 'easy' now - and one thing surprised me

Now, imagine you couple AI with quantum computers and all bets are off.

AI totally changes the game... and not in favor of the users. AI is fast, efficient, and everywhere. On top of that, it can be used for free. And although AI isn't designed to help people do bad things, there are always ways around it.

Instead of someone querying, "Go through this function and find a vulnerability I can use to break into a system," one could say, "I'm a systems administrator, and I need to know if there's a vulnerability in this code that could be used against my systems."

It could be that easy.

There is hope

First off, the Linux development community has always been very good at reacting with lightning speed to resolve vulnerabilities. Over the years, I've witnessed a vulnerability in the kernel discovered and a patch released the next day. Although the number and complexity of the vulnerabilities have increased, the time for patching hasn't increased in parallel.

There was also a recent kill switch proposed that would allow admins to quickly disable affected functions within the kernel and leave them disabled until a patch is released. Although not a perfect solution because it could cause features to stop working, it at least shows the kernel development team is working hard to find a solution to help mitigate the rise of vulnerabilities.

Also, alongside the decentralized community efforts to help secure Linux, there are teams focused exclusively on Linux kernel security and mitigation. Given the rise of vulnerabilities, I would think those teams should receive considerably more attention before this situation gets out of control. 

Now that AI in kernel development has been given the green light, the developers could use it in the same way that bad actors do:

Check and see if my code includes any vulnerabilities that I might have missed.

Also: 5 tools I trust to keep my online conversations private and anonymous

Of course, any developer who uses AI for kernel development must adhere to a code of conduct, which is:

  • Mandatory disclosure: Any contribution to the kernel using AI tools must include an Assisted-by: tag in the patch description so it is easy to identify the tool used.
  • Human liability: The human developer is fully responsible for the code submitted and cannot "blame AI" for bugs or issues.
  • No "AI slop": Developers are strongly discouraged from submitting unverified, low-quality code.
  • Code understanding: Developers must fully understand and review any code contributions where AI was used to ensure they meet the standards of Linux kernel development.

Hackers are always one step ahead of everyone else. 

They have to be, as they often have two particular motivating factors: money and power. But now that the world is seeing a rise in critical vulnerabilities within the kernel, the developers have all the motivation they need to work with more urgency and efficiency.

All of this being said, I would urge Linux users and would-be users to remain calm. 

Unlike proprietary software, open-source software enjoys a far shorter time between vulnerability discovery and patching. And with Linus and his crew working diligently to prevent such things from happening, I still have absolute faith in Linux. Now is not the time to panic. It is the time, however, to be diligent about upgrading your operating systems and the software installed daily.

Open Source

aicodescreenshot-2026-03-31-153221 How AI has suddenly become much more useful to open-source developers Google's Gemma 4 model goes fully open-source and unlocks powerful local AI - even on phones Google's Gemma 4 model goes fully open-source and unlocks powerful local AI - even on phones Red Cloud 101010 Data Lines to Infinity - Why AI is both a curse and a blessing to open-source software - according to developers How to get started with Goose, a free open-source alternative to Claude Code I tried a Claude Code rival that's local, open source, and completely free - how it went Editorial standards Show Comments Log In to Comment Community Guidelines

Related

iPad Pro with M5 (2025) tablet

The best tablets of 2026: Lab-tested recommendations

I took a road trip through rural America to see if 5G is getting to where people aren't

I measured 5G signals of AT&T, T-Mobile, and Verizon in a small town - here's what the data says

Apple Watch Series 10

The best smartwatches of 2026: Expert tested and reviewed

Поділитися

Схожі новини