Fragnesia — New Linux Privilege Escalation Flaw

Overview Linux distributions are urgently rolling out patches for a newly disclosed high‑severity kernel vulnerability dubbed Fragnesia (CVE‑2026‑46300). This flaw allows unprivileged local attackers to gain root privileges by exploiting a logic bug in the XFRM ESP‑in‑TCP subsystem.

Technical Details

  • Discovered by: William Bowling, Zellic’s head of assurance.
  • Exploit Mechanism:
    • Attackers can write arbitrary bytes into the kernel page cache of read‑only files.
    • Proof‑of‑concept (PoC) exploit corrupts /usr/bin/su in memory, yielding a root shell.
  • Vulnerability Class: Belongs to the Dirty Frag family of flaws disclosed last week.
    • Unlike Dirty Frag, which chains two kernel bugs (CVE‑2026‑43284 and CVE‑2026‑43500), Fragnesia is a single bug in ESP/XFRM.
    • Both share the same attack surface and mitigation strategy.

Impact

  • Affected Systems: All Linux kernels released before May 13, 2026.
  • Attack Type: Local privilege escalation (LPE).
  • Risk: Universal root access on vulnerable systems, enabling attackers to bypass security controls and compromise workloads.

Mitigation Guidance

  • Immediate Action: Apply kernel updates provided by your distribution.
  • Temporary Workaround (same as Dirty Frag mitigation):bashrmmod esp4 esp6 rxrpc printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf ⚠️ Note: This breaks AFS distributed file systems and IPsec VPNs.
  • High‑Security Workloads: Consider removing vulnerable modules entirely until patched kernels are deployed.

Context

  • Copy Fail (CVE‑2026‑31431): Actively exploited LPE added to CISA’s catalog on May 1, with federal agencies ordered to patch by May 15.
  • Pack2TheRoot: Another Linux privilege escalation flaw patched in April 2026 after lurking unnoticed for a decade.
  • Trend: Local privilege escalation vulnerabilities remain a frequent attack vector for adversaries targeting Linux environments.

Final Thought

Fragnesia reinforces the urgency of rapid patch adoption in Linux environments. With PoC exploits already public, attackers can weaponize this flaw quickly. For defenders, the lesson is clear: kernel subsystems like ESP/XFRM must be treated as critical attack surfaces, and proactive module hardening is essential until fixes are applied.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.