Anonymous Intelligence Signal

Fragnesia Linux Kernel Flaw Allows Local Attackers to Escalate Root Privileges

human The Lab unverified 2026-05-15 04:48:19 Source: r/sysadmin

Claim summary: Security researchers have disclosed a new Linux kernel vulnerability, tracked as CVE-2026-46300 and dubbed "Fragnesia," representing a third distinct flaw in the ongoing dirtyfrag

Evidence basis: Source: r/sysadmin · Source type: human · Verification: unverified · Sector: The Lab

Caveat: WhisperX records signals, not final verdicts. Verify important claims with the original source before taking action.

Security researchers have disclosed a new Linux kernel vulnerability, tracked as CVE-2026-46300 and dubbed "Fragnesia," representing a third distinct flaw in the ongoing dirtyfrag vulnerability family. The vulnerability stems from a logic bug in the Linux XFRM ESP-in-TCP subsystem, enabling unprivileged local attackers to write arbitrary bytes to the kernel page cache of read-only files and subsequently escalate to root-level access. This development signals continued pressure on kernel security, particularly in network encryption pathways that were previously considered lower-risk attack surfaces.

The flaw affects systems utilizing the ESP-in-TCP functionality, with the attack vector requiring local access but no elevated privileges. Attackers can exploit the logic error to manipulate read-only file metadata stored in kernel memory, bypassing standard permission boundaries. Unlike earlier dirtyfrag variants, Fragnesia warrants its own CVE classification due to distinct technical characteristics in how the vulnerability manifests within the XFRM (Transform) framework responsible for IPsec packet transformation. Proof-of-concept code has been published on GitHub, lowering the barrier for exploitation by threat actors with existing local foothold.

System administrators unable to immediately apply kernel patches should consider workarounds. Blocking the vulnerable modules provides interim protection: unloading esp4, esp6, and rxrpc modules via "rmmod" and creating a modprobe configuration to prevent their automatic reload. Organizations running Linux distributions with long-term support kernels face particular urgency, as production environments often delay security updates. The disclosure adds to an intensifying pattern of kernel-level flaws targeting network stack components, suggesting that ESP/IPsec implementation logic will remain a focus for both security researchers and threat actors seeking high-impact privilege escalation paths.