New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption
Overview
A new variant of a local privilege escalation vulnerability in the Linux kernel, named Fragnesia, has been identified. This vulnerability, tracked as CVE-2026-46300 with a CVSS score of 7.8, allows local attackers to gain root access through page cache corruption. This marks the third such vulnerability discovered in the Linux kernel within just two weeks, raising concerns for users and administrators. The flaw is rooted in the kernel's XFRM component, which is responsible for managing IPsec protocols. This means that systems using affected kernel versions could be at risk if not addressed promptly, as attackers could exploit this vulnerability to gain elevated privileges and potentially take control of vulnerable systems.
Key Takeaways
- Affected Systems: Linux kernel versions affected by the XFRM component, specifically those vulnerable to local privilege escalation.
- Action Required: System administrators are advised to update their Linux kernel to the latest version that addresses this vulnerability.
- Timeline: Newly disclosed
Original Article Summary
Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a span of two weeks. Codenamed Fragnesia, the security vulnerability is tracked as CVE-2026-46300 (CVSS score: 7.8) and is rooted in the Linux kernel's XFRM
Impact
Linux kernel versions affected by the XFRM component, specifically those vulnerable to local privilege escalation.
Exploitation Status
The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.
Timeline
Newly disclosed
Remediation
System administrators are advised to update their Linux kernel to the latest version that addresses this vulnerability. Specific patch details were not provided, but users should monitor official Linux distribution channels for updates.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Linux, CVE, Exploit, and 2 more.