{"id":484491,"date":"2026-05-14T15:28:16","date_gmt":"2026-05-14T15:28:16","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/484491\/"},"modified":"2026-05-14T15:28:16","modified_gmt":"2026-05-14T15:28:16","slug":"fragnesia-new-linux-kernel-lpe-bug-was-spawned-by-dirty-frag-patch-cve-2026-46300","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/484491\/","title":{"rendered":"Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)"},"content":{"rendered":"<p>Researchers have found and disclosed yet another local privilege escalation (LPE) vulnerability in the Linux kernel: CVE-2026-46300, aka \u201cFragnesia\u201d.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2026\/05\/linux-tux-650.webp\" class=\"aligncenter\" alt=\"Fragnesia CVE-2026-46300 Linux LPE\" title=\"Linux\"\/><\/p>\n<p>The flaw is in the same class of vulnerabilities as the recently disclosed <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/05\/08\/dirty-frag-linux-vulnerability-cve-2026-43284-cve-2026-43500\/\" target=\"_blank\" rel=\"nofollow noopener\">Dirty Frag<\/a> bug(s). <\/p>\n<p>Like Dirty Frag, it affects the same Linux module (xfrm-ESP). In fact, according to Dirty Frag discoverer Hyunwoo Kim, Fragnesia was \u201caccidentally activated\u201d by the patch fixing one of the original Dirty Frag vulnerabilities (i.e., CVE-2026-43284).<\/p>\n<p>CVE-2026-46300 explained<\/p>\n<p>Fragnesia was discovered by William Bowling of Zellic.io, with the help of the company\u2019s  AI-agentic software auditing tool.<\/p>\n<p>The research team published a short <a href=\"https:\/\/github.com\/v12-security\/pocs\/tree\/d4043edc2acbd75d093e3f5795751b678c66b259\/fragnesia\" target=\"_blank\" rel=\"nofollow noopener\">technical explainer<\/a> and <a href=\"https:\/\/github.com\/v12-security\/pocs\/blob\/d4043edc2acbd75d093e3f5795751b678c66b259\/fragnesia\/fragnesia.c\" target=\"_blank\" rel=\"nofollow noopener\">proof-of-concept exploit code<\/a>. <\/p>\n<p>As Wiz researchers <a href=\"https:\/\/www.wiz.io\/blog\/fragnesia-linux-kernel-local-privilege-escalation-via-esp-in-tcp\" target=\"_blank\" rel=\"nofollow noopener\">helpfully explained<\/a>, Fragnesia allows unprivileged local attackers to modify read-only file contents in the kernel page cache, and \u201cthrough a deterministic page-cache corruption primitive,\u201d achieve root privileges.  <\/p>\n<p>Patches and mitigations for Fragnesia<\/p>\n<p>Like <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/04\/30\/copyfail-linux-lpe-vulnerability-cve-2026-31431\/\" rel=\"nofollow noopener\" target=\"_blank\">Copy Fail<\/a> and Dirty Frag before it, Fragnesia is less of a risk for single-user workstations and single-tenant servers than for shared Linux hosts (where multiple users share a kernel), container clusters (where the page cache is shared across the host), CI runners and build farms, and cloud SaaS solutions running user code.<\/p>\n<p>Linux admins should apply vendor kernel patches when they become available. In the meantime, they should disable\/denylist or unload the vulnerable modules (for both Fragnesia and DirtyFrag: <strong>esp4<\/strong>, <strong>esp6<\/strong>, <strong>rxrpc<\/strong>) to mitigate the risk of exploitation.<\/p>\n<p>Some Linux distributions have already relased kernel patches, namely <a href=\"https:\/\/almalinux.org\/blog\/2026-05-13-fragnesia-cve-2026-46300\/\" target=\"_blank\" rel=\"nofollow noopener\">AlmaLinux<\/a> and <a href=\"https:\/\/blog.cloudlinux.com\/fragnesia-mitigation-and-kernel-update\" target=\"_blank\" rel=\"nofollow noopener\">CloudLinux<\/a>.<\/p>\n<p>\u201cThe exploit can modify legitimate system binaries (the public PoC overwrites <strong>\/usr\/bin\/su<\/strong>) in the page cache as part of gaining root, so applying the mitigation alone is not enough on systems that may have been targeted before the mitigation was in place,\u201d the CloudLinux team explained. <\/p>\n<p>\u201cAfter mitigating, drop the page cache to force a reload from disk [by running the following command: <strong>sudo sh -c \u201cecho 3 &gt; \/proc\/sys\/vm\/drop_caches\u201d<\/strong>].\u201d<\/p>\n<p>Microsoft\u2019s threat analysts also <a href=\"https:\/\/x.com\/MsftSecIntel\/status\/2054701609024934064\" target=\"_blank\" rel=\"nofollow\">pointed out<\/a> that exploitation is \u201cnot constrained to use the [\/usr\/bin\/su] binary,\u201d and that attackers \u201ccan modify any file readable by the user, including [\/etc\/passwd].\u201d <\/p>\n<p>They also added that there is currently no evidence pointing to in-the-wild exploitation of Fragnesia.<\/p>\n<p>Copy Fail, on the other hand, has been added to CISA\u2019s Known Exploited Vulnerabilities catalog earlier this month. <\/p>\n<p>Kernel patches for Copy Fail are now widely available, but for a temporary mitigation admins can denylist or unload the <strong>algif_aead<\/strong> module.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/09\/devider.webp.webp\"\/><\/p>\n<p><strong>Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. <a href=\"https:\/\/www.helpnetsecurity.com\/newsletter\/\" rel=\"nofollow noopener\" target=\"_blank\">Subscribe here!<\/a><\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/09\/devider.webp.webp\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"Researchers have found and disclosed yet another local privilege escalation (LPE) vulnerability in the Linux kernel: CVE-2026-46300, aka&hellip;\n","protected":false},"author":2,"featured_media":484492,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[48542,18,211862,19,17,25688,211863,55989,82,27983],"class_list":{"0":"post-484491","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-containers","9":"tag-eire","10":"tag-exploit","11":"tag-ie","12":"tag-ireland","13":"tag-linux","14":"tag-poc","15":"tag-servers","16":"tag-technology","17":"tag-vulnerability"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ie\/116573641704334470","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/484491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=484491"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/484491\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/484492"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=484491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=484491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=484491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}