What's Happening?
A new vulnerability in the Linux kernel, named Fragnesia and tracked as CVE-2026-46300, has been identified, allowing local users to gain root access. Discovered by William Bowling of Zellic and the V12 team, this flaw is part of the Dirty Frag family
of Linux local privilege escalation vulnerabilities. The flaw affects all Linux kernels released before May 13, 2026, and involves the kernel's handling of shared page fragments when merging socket buffers. This vulnerability can be exploited by feeding file contents into a TCP socket and enabling ESP-in-TCP encryption, leading to controlled overwrites in memory. A proof-of-concept exploit has been published, demonstrating how the flaw can be used to rewrite the opening bytes of /usr/bin/su, dropping to a root shell without leaving traces on the disk. This disclosure follows two other recent Linux kernel vulnerabilities, Copy Fail and Dirty Frag, highlighting ongoing security challenges.
Why It's Important?
The discovery of the Fragnesia flaw underscores significant security risks within the Linux operating system, which is widely used in servers and critical infrastructure. The ability for local users to gain root access poses a severe threat, potentially allowing malicious actors to execute arbitrary code, access sensitive data, and compromise system integrity. This vulnerability could impact numerous organizations relying on Linux for their operations, necessitating urgent security measures. The flaw's existence in all Linux kernels before the disclosure date means that a vast number of systems are potentially vulnerable, emphasizing the need for immediate patching and security updates. The situation highlights the importance of robust security practices and the need for continuous monitoring and updating of systems to protect against emerging threats.
What's Next?
In response to the Fragnesia vulnerability, a candidate upstream fix has been submitted to the netdev mailing list, though it has not yet been merged into the mainline kernel. Several Linux distributions have started shipping their own backported patches to address the issue. Administrators are advised to disable the esp4, esp6, and rxrpc kernel modules as an interim defense, as these modules are used by both Fragnesia and the earlier Dirty Frag vulnerability. Additionally, restricting unprivileged user namespaces and monitoring for suspicious namespace creation or XFRM manipulation are recommended as temporary measures. The Linux community and security teams will need to remain vigilant, ensuring that systems are updated promptly and that any new vulnerabilities are addressed swiftly to prevent exploitation.











