LIVE NEWS
  • A Coding Implementation to Master GPU Computing with CuPy, Custom CUDA Kernels, Streams, Sparse Matrices, and Profiling
  • How a kindergarten teacher became the accidental guardian of 200 king penguins | Conservation
  • The Supreme Court keeps abortion pill mifepristone available by telehealth : NPR
  • Time for ‘Novel Ideals’: Rural Health Leaders Share Strategies Amid Budget Constraints
  • ChatGPT just hit its lowest referral share ever as Gemini and Perplexity quietly keep stealing frustrated users away
  • Dead whale spotted off the coast of Denmark
  • Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)
  • Here's how the NYT crafts bestseller lists — and how authors try to game them
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)
Cybersecurity

Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)

primereportsBy primereportsMay 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)
Share
Facebook Twitter LinkedIn Pinterest Email


Researchers have found and disclosed yet another local privilege escalation (LPE) vulnerability in the Linux kernel: CVE-2026-46300, aka “Fragnesia”.

Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)

The flaw is in the same class of vulnerabilities as the recently disclosed Dirty Frag bug(s).

Like Dirty Frag, it affects the same Linux module (xfrm-ESP). In fact, according to Dirty Frag discoverer Hyunwoo Kim, Fragnesia was “accidentally activated” by the patch fixing one of the original Dirty Frag vulnerabilities (i.e., CVE-2026-43284).

CVE-2026-46300 explained

Fragnesia was discovered by William Bowling of Zellic.io, with the help of the company’s AI-agentic software auditing tool.

The research team published a short technical explainer and proof-of-concept exploit code.

As Wiz researchers helpfully explained, Fragnesia allows unprivileged local attackers to modify read-only file contents in the kernel page cache, and “through a deterministic page-cache corruption primitive,” achieve root privileges.

Patches and mitigations for Fragnesia

Like Copy Fail and Dirty Frag before it, Fragnesia is less of a risk for single-user workstations and single-tenant servers than for shared Linux hosts (where multiple users share a kernel), container clusters (where the page cache is shared across the host), CI runners and build farms, and cloud SaaS solutions running user code.

Linux admins should apply vendor kernel patches when they become available. In the meantime, they should disable/denylist or unload the vulnerable modules (for both Fragnesia and DirtyFrag: esp4, esp6, rxrpc) to mitigate the risk of exploitation.

Some Linux distributions have already relased kernel patches, namely AlmaLinux and CloudLinux.

“The exploit can modify legitimate system binaries (the public PoC overwrites /usr/bin/su) in the page cache as part of gaining root, so applying the mitigation alone is not enough on systems that may have been targeted before the mitigation was in place,” the CloudLinux team explained.

“After mitigating, drop the page cache to force a reload from disk [by running the following command: sudo sh -c “echo 3 > /proc/sys/vm/drop_caches”].”

Microsoft’s threat analysts also pointed out that exploitation is “not constrained to use the [/usr/bin/su] binary,” and that attackers “can modify any file readable by the user, including [/etc/passwd].”

They also added that there is currently no evidence pointing to in-the-wild exploitation of Fragnesia.

Copy Fail, on the other hand, has been added to CISA’s Known Exploited Vulnerabilities catalog earlier this month.

Kernel patches for Copy Fail are now widely available, but for a temporary mitigation admins can denylist or unload the algif_aead module.

Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHere's how the NYT crafts bestseller lists — and how authors try to game them
Next Article Dead whale spotted off the coast of Denmark
primereports
  • Website

Related Posts

Cybersecurity

Major tech manufacturer Foxconn confirms cyberattack hit North American factories

May 14, 2026
Cybersecurity

Most Organizations Use AI Agents for Sensitive Security Tasks

May 14, 2026
Cybersecurity

Adobe Express vs Canva: Which design tool is better?

May 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • A Coding Implementation to Master GPU Computing with CuPy, Custom CUDA Kernels, Streams, Sparse Matrices, and Profiling
  • How a kindergarten teacher became the accidental guardian of 200 king penguins | Conservation
  • The Supreme Court keeps abortion pill mifepristone available by telehealth : NPR
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.