{"id":17222,"date":"2026-05-14T08:27:54","date_gmt":"2026-05-14T15:27:54","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=17222"},"modified":"2026-05-14T08:27:54","modified_gmt":"2026-05-14T15:27:54","slug":"new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2026\/05\/14\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges\/","title":{"rendered":"New Fragnesia Linux Flaw Lets Attackers Gain Root Privileges"},"content":{"rendered":"\n<p>I suppose this is why new Linux kernels were released today.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.kernel.org\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"810\" height=\"436\" src=\"https:\/\/jasonsblog.ddns.net\/wp-content\/uploads\/2026\/05\/image-11.png\" alt=\"\" class=\"wp-image-17223\" srcset=\"https:\/\/jasonsblog.ddns.net\/wp-content\/uploads\/2026\/05\/image-11.png 810w, https:\/\/jasonsblog.ddns.net\/wp-content\/uploads\/2026\/05\/image-11-300x161.png 300w, https:\/\/jasonsblog.ddns.net\/wp-content\/uploads\/2026\/05\/image-11-768x413.png 768w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges\/<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_3e52a8a4-8791-4679-bd07-3ba98ddc0c95\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<p>By Sergiu Gatlan<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/10\/31\/Linux.jpg\" alt=\"Linux\"\/><\/figure>\n\n\n\n<p>Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability that allows attackers to run malicious code as root.<\/p>\n\n\n\n<p>Known as <a href=\"https:\/\/github.com\/v12-security\/pocs\/tree\/main\/fragnesia\" target=\"_blank\" rel=\"noreferrer noopener\">Fragnasia<\/a> and tracked as <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2026-46300\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-46300<\/a>, this security flaw stems from a logic bug in the Linux XFRM ESP-in-TCP subsystem that can enable unprivileged local attackers to gain root privileges by writing arbitrary bytes to the kernel page cache of read-only files.<\/p>\n\n\n\n<p>Zellic&#8217;s head of assurance, <a href=\"https:\/\/x.com\/wcbowling?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\">William Bowling<\/a>, who discovered this new universal local privilege escalation flaw, also shared a proof-of-concept (PoC) exploit that achieves a memory-write primitive in the kernel that is used to corrupt the page cache memory of the \/usr\/bin\/su binary to get a shell with root privileges on vulnerable systems.<\/p>\n\n\n\n<p>Bowling said this flaw belongs to the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-linux-dirty-frag-zero-day-with-poc-exploit-gives-root-privileges\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dirty Frag<\/a> vulnerability class, which was disclosed last week, and affects all Linux kernels released before May 13, 2026. Just as Fragnasia, Dirty Frag has a publicly available PoC exploit that local attackers can use to gain root privileges on major Linux distributions.<\/p>\n\n\n\n<p>However, Dirty Frag works by chaining two separate kernel flaws, the xfrm-ESP Page-Cache Write vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-43284\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-43284<\/a>) and a RxRPC Page-Cache Write security issue (<a href=\"http:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-43500\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-43500<\/a>), to achieve privilege escalation by modifying protected system files in memory.<\/p>\n\n\n\n<p>&#8220;Fragnesia is a member of the Dirty Frag vulnerability class. This is a separate bug in the ESP\/XFRM from dirtyfrag which has received <a href=\"https:\/\/lists.openwall.net\/netdev\/2026\/05\/13\/79\" target=\"_blank\" rel=\"noreferrer noopener\">its own patch<\/a>. However, it is in the same surface and the mitigation is the same as for dirtyfrag,&#8221; Bowling said.<\/p>\n\n\n\n<p>&#8220;It abuses a logic bug in the Linux XFRM ESP-in-TCP subsystem to achieve arbitrary byte writes into the kernel page cache of read-only files, without requiring any race condition.&#8221;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>another day, another universal linux LPE <a href=\"https:\/\/t.co\/GANYkAJwZS\">https:\/\/t.co\/GANYkAJwZS<\/a> <a href=\"https:\/\/t.co\/XfzTsmg7kl\">pic.twitter.com\/XfzTsmg7kl<\/a> \u2014 V12 (@v12sec) <a href=\"https:\/\/twitter.com\/v12sec\/status\/2054491454064746629?ref_src=twsrc%5Etfw\">May 13, 2026<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>To secure systems against attacks, Linux users are advised to apply kernel updates for their environment as soon as possible.<\/p>\n\n\n\n<p>Those who can&#8217;t immediately patch their devices should use the same mitigation used for Dirty Frag commands to remove vulnerable&nbsp;kernel modules (however, it&#8217;s important to note that this will break AFS distributed network file systems and IPsec VPNs):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>rmmod esp4 esp6 rxrpc\nprintf 'install esp4 \/bin\/false\\ninstall esp6 \/bin\/false\\ninstall rxrpc \/bin\/false\\n' &gt; \/etc\/modprobe.d\/dirtyfrag.conf<\/code><\/pre>\n\n\n\n<p>Fragnasia&#8217;s disclosure comes as Linux distros are still rolling out patches for &#8220;<a href=\"https:\/\/www.bleepingcomputer.com\/tag\/copy-fail\/\" target=\"_blank\" rel=\"noreferrer noopener\">Copy Fail<\/a>,&#8221; another privilege escalation vulnerability now <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-says-copy-fail-flaw-now-exploited-to-root-linux-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">actively exploited in the wild<\/a>.<\/p>\n\n\n\n<p>CISA <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/05\/01\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">added<\/a> Copy Fail to its <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search=CVE-2026-32202&amp;field_date_added_wrapper=all&amp;field_cve=&amp;sort_by=field_date_added&amp;items_per_page=20&amp;url=\" target=\"_blank\" rel=\"noreferrer noopener\">catalog of flaws exploited in attacks<\/a> on May 1 and ordered federal agencies to secure their Linux systems within two weeks, by May 15.<\/p>\n\n\n\n<p>&#8220;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,&#8221; the U.S. cybersecurity agency warned. &#8220;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&#8221;<\/p>\n\n\n\n<p>In April, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-pack2theroot-flaw-gives-hackers-root-linux-access\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux distros patched<\/a> another root-privilege escalation vulnerability (dubbed Pack2TheRoot) in the PackageKit daemon that had gone unnoticed for a decade.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I suppose this is why new Linux kernels were released today. https:\/\/www.bleepingcomputer.com\/news\/security\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges\/ By Sergiu Gatlan Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability that allows attackers to run malicious code as root. Known as Fragnasia and tracked as CVE-2026-46300, this security flaw stems from a logic bug in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-17222","post","type-post","status-publish","format-standard","hentry","category-tech"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/17222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=17222"}],"version-history":[{"count":2,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/17222\/revisions"}],"predecessor-version":[{"id":17225,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/17222\/revisions\/17225"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=17222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=17222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=17222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}