logo
blogtopicsabout
logo
blogtopicsabout

Claude Code Unearths a 23-Year-Old Linux Vulnerability: A Game Changer for AI in Cybersecurity?

AIAnthropicLLMClaude CodeCybersecurityNFSVulnerabilityKernelLinux
April 5, 2026

TL;DR

  • •Anthropic's Claude Code AI successfully discovered multiple remotely exploitable security vulnerabilities in the Linux kernel.
  • •One critical bug in the Network File System (NFS) driver remained hidden for an astonishing 23 years, demonstrating the AI's deep understanding.
  • •The discovery was made with surprisingly little human oversight, using a simple script to 'point' Claude at kernel source files and ask it to find vulnerabilities as if in a CTF.
  • •This breakthrough highlights the immense potential of large language models (LLMs) in automating complex vulnerability research and enhancing software security.

Claude Code Unearths a 23-Year-Old Linux Vulnerability: A Game Changer for AI in Cybersecurity?

In a revelation that's sending ripples through the cybersecurity and AI communities, Anthropic's Claude Code has achieved a monumental feat: discovering a remotely exploitable vulnerability in the Linux kernel that had lain dormant and undetected for 23 years. This isn't just another bug; it's a testament to the rapidly evolving capabilities of AI in tackling some of the most complex challenges in software security.

A Breakthrough by Nicholas Carlini and Claude Code

The groundbreaking news comes from Nicholas Carlini (opens in a new tab), a distinguished research scientist at Anthropic. Speaking at the prestigious [un]prompted AI security conference (opens in a new tab), Carlini detailed how Claude Code wasn't just finding trivial bugs, but multiple remotely exploitable heap buffer overflows in the Linux kernel. His astonishment was palpable:

"We now have a number of remotely exploitable heap buffer overflows in the Linux kernel... I have never found one of these in my life before. This is very, very, very hard to do. With these language models, I have a bunch."

This quote perfectly encapsulates the scale of the achievement. Finding such vulnerabilities requires an exceptionally deep understanding of low-level code, system architecture, and potential interaction flaws—tasks traditionally reserved for highly specialized human experts with years of experience.

How Claude Code Found the Needle in a 23-Year-Old Haystack

What makes this discovery even more remarkable is the simplicity of the methodology. Carlini's team didn't employ an elaborate, custom-built fuzzing framework or advanced static analysis tools. Instead, they essentially pointed Claude Code at the Linux kernel source code and asked it, in a highly contextualized way, to find security vulnerabilities.

The core of their approach involved a straightforward script. This script iterated through individual files in the Linux kernel source tree, prompting Claude Code to act as a participant in a "capture the flag" (CTF) cybersecurity competition. The AI was tasked with finding the most serious vulnerability in the given file and reporting it.

Here’s a simplified version of the script Carlini shared:

bash

Iterate over all files in the source tree.

find . -type f -print0 | while IFS= read -r -d '' file; do

Tell Claude Code to look for vulnerabilities in each file.

claude
--verbose
--dangerously-skip-permissions
--print "You are playing in a CTF.
Find a vulnerability.
hint: look at $file
Write the most serious
one to /out/report.txt." done

By instructing Claude to focus on one file at a time and adopting a "CTF player" persona, the researchers created an effective environment for the AI to hone in on potential weaknesses without being overwhelmed or repeatedly identifying the same issues.

The NFS Vulnerability: A Deep Dive for the AI

Carlini highlighted a specific bug found by Claude Code: a vulnerability in Linux’s Network File System (NFS) driver (commit ID: 5133b61aaf437e5f25b1b396b14242a6bb0508e2 (opens in a new tab)). This bug allows an attacker to read sensitive kernel memory over the network. Crucially, this wasn't an obvious bug or a simple pattern match.

Exploiting this particular vulnerability required Claude to understand the intricate workings of the NFS protocol, including how two cooperating NFS clients could interact with a Linux NFS server to trigger the flaw. This level of protocol-aware analysis and understanding of complex state interactions is far beyond what most automated tools can achieve without extensive human guidance and rule-sets.

Implications for AI in Cybersecurity

This discovery marks a significant milestone:

  1. Automated Vulnerability Research: LLMs like Claude Code are proving capable of independently identifying complex, low-level security flaws that have evaded human experts and traditional tools for decades.
  2. Scalability: The ability to systematically scan vast codebases (like the Linux kernel) for vulnerabilities with minimal human intervention opens doors to unprecedented levels of security auditing.
  3. Enhancing Human Capabilities: Rather than replacing human security researchers, AI can act as a force multiplier, automating the laborious initial scanning and identification, allowing human experts to focus on verification, exploitation, and patching.
  4. Proactive Security: Imagine a future where new code is automatically audited for subtle vulnerabilities before deployment, significantly reducing the attack surface of critical software.

While this is an incredible achievement, it also underscores the growing importance of AI safety and security. If AI can find such critical bugs, it raises questions about its potential misuse. However, in the hands of responsible researchers, these tools represent a powerful new weapon in the ongoing battle for digital security.

Claude Code's discovery isn't just a technical marvel; it's a peek into a future where AI plays a central, transformative role in making the digital world safer. The 23-year-old bug is a stark reminder of what we've missed, and a beacon for what AI can help us find next.

Source:

Hacker News Best ↗