Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Interview: How Alpine’s Head of IT Secures an F1 Team

May 14, 2026

New Fragnesia Flaw Hands Linux Local Users Root Access

May 14, 2026

The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open

May 14, 2026
Facebook X (Twitter) Instagram
Friday, May 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Fragnesia Flaw Hands Linux Local Users Root Access
News

New Fragnesia Flaw Hands Linux Local Users Root Access

Team-CWDBy Team-CWDMay 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new variant in the Dirty Frag family of Linux local privilege escalation flaws has surfaced, the third root-level Linux kernel bug disclosed in three weeks.

According to new analysis from cloud security firm Wiz, the vulnerability, dubbed Fragnesia and tracked as CVE-2026-46300, was discovered by William Bowling of Zellic and the V12 team. A working proof-of-concept (PoC) exploit was published alongside the disclosure on May 13.

The flaw affects all Linux kernels released before that date and allows unprivileged local users to gain root by writing arbitrary bytes into the kernel page cache of read-only files.

Page Cache Corruption via ESP Decryption

The flaw lives in how the kernel tracks shared page fragments when it merges socket buffers. Under the right sequence of operations, that bookkeeping fails and the kernel loses sight of which memory pages are backed by external files.

An attacker can engineer that confusion by feeding file contents into a TCP socket and then enabling ESP-in-TCP encryption on the same socket after the fact. The kernel then proceeds to decrypt the queued bytes directly over the cached file pages, with the AES-GCM keystream producing controlled overwrites in memory.

In the PoC released by Bowling, the technique was used to rewrite the opening bytes of /usr/bin/su with a short payload that drops to a root shell. Because the change is made only to the kernel’s in-memory copy of the binary, the on-disk file remains untouched and the tampering leaves no trace for standard disk forensics.

Read more on Linux kernel flaws: CrackArmor Flaws Expose Linux Systems to Privilege Escalation

A Side Effect of the Dirty Frag Patch

Bowling described Fragnesia as a “separate bug in the ESP/XFRM from dirtyfrag” that lives in the same kernel attack surface. Hyunwoo Kim, the researcher behind Dirty Frag, said the new flaw emerged as an unintended side effect of one of the patches addressing his original vulnerabilities.

The disclosure follows two other Linux kernel local privilege escalation flaws disclosed in recent weeks, Copy Fail (CVE-2026-31431) on April 29 and Dirty Frag (CVE-2026-43284 and CVE-2026-43500) on May 7.

A candidate upstream fix was submitted to the netdev mailing list on May 13 and had not been merged into the mainline kernel at the time of publication. However, several Linux distributions have begun shipping their own backported patches.

Fragnesia uses the same esp4, esp6 and rxrpc kernel modules as Dirty Frag, meaning administrators who already disabled those modules as an interim defense against Dirty Frag are covered for Fragnesia as well until patched kernels are available.

Restricting unprivileged user namespaces and monitoring for suspicious namespace creation or XFRM manipulation are also recommended interim steps.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open
Next Article Interview: How Alpine’s Head of IT Secures an F1 Team
Team-CWD
  • Website

Related Posts

News

The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open

May 14, 2026
News

Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage

May 14, 2026
News

Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

What are brushing scams and how do I stay safe?

December 24, 2025

Managing risks to your loved one’s digital estate

April 2, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.