Claude Code Found a Linux Vulnerability Hidden for 23 Years

81 points by mtlynch


dvogel

Nicholas chose this bug to show that Claude Code isn’t just finding obvious bugs or looking for common patterns. This bug required the AI model to understand intricate details of how the NFS protocol works.

I don't think this is true. This is believing that all output of the tool was necessary to reach the final state.

The problem is that at step (6), when the NFS server tries to generate a response to client B denying the lock request, it uses a memory buffer that’s only 112 bytes. The denial message includes the owner ID, which can be up to 1024 bytes, bringing the total size of the message to 1056 bytes. The kernel writes 1056 bytes into a 112-byte buffer, meaning that the attacker can overwrite kernel memory with bytes they control in the owner ID field from step (3).

This also could have been found by attribute testing and/or fuzzing. Neither of those tools would have understood the protocol. Therefore understanding the protocol is not necessary.

I think the main thing this shows is that a high level of required effort has been a barrier to thorough testing of some parts of the kernel and that Claude et al drastically lower the effort required.