Linux Kernel bug Fragnesia allows local root access attacks

Security Affairs

Overview

Researchers have identified a new vulnerability in the Linux kernel, named Fragnesia and tracked as CVE-2026-46300, which could allow local attackers to gain root access through page cache corruption. This flaw affects the XFRM ESP-in-TCP subsystem and has a CVSS score of 7.8, indicating a significant risk. If exploited, it could enable attackers to take complete control of the affected systems. It's crucial for users of affected Linux systems to be aware of this vulnerability and take necessary precautions. The disclosure of this flaw highlights ongoing security challenges within the Linux ecosystem.

Key Takeaways

  • Affected Systems: Linux kernel, specifically the XFRM ESP-in-TCP subsystem.
  • Action Required: Users should apply any available updates or patches to the Linux kernel as they are released by their distributions.
  • Timeline: Newly disclosed

Original Article Summary

Fragnesia, a new Linux kernel flaw tracked as CVE-2026-46300, could let local attackers gain root access through page cache corruption. Researchers disclosed a new Linux kernel privilege escalation vulnerability named Fragnesia, tracked as CVE-2026-46300 (CVSS score of 7.8). The flaw affects the XFRM ESP-in-TCP subsystem and could allow local attackers to gain full root access […]

Impact

Linux kernel, specifically the XFRM ESP-in-TCP subsystem.

Exploitation Status

No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.

Timeline

Newly disclosed

Remediation

Users should apply any available updates or patches to the Linux kernel as they are released by their distributions. It's advisable to monitor security bulletins from vendors for specific mitigation strategies related to CVE-2026-46300.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Linux, CVE, Vulnerability, and 1 more.

Related Coverage

American Lending Center Data Breach Affects 123,000 Individuals

SecurityWeek

American Lending Center, a non-bank lender, recently confirmed that a ransomware attack it experienced nearly a year ago has impacted the personal data of approximately 123,000 individuals. The company took time to thoroughly investigate the breach before disclosing it to the public. While specific details about how the attackers gained access or the type of data compromised have not been released, the incident raises concerns about the security of sensitive financial information. Affected individuals may face risks such as identity theft or financial fraud as a result of this breach. It serves as a reminder for companies to prioritize cybersecurity measures to protect client data.

May 15, 2026

Bypassing On-Camera Age-Verification Checks

Schneier on Security

Recent findings reveal that some AI-driven video age-verification systems can be easily deceived using simple disguises, like a fake mustache. This raises significant concerns for platforms relying on these systems to prevent underage access to content. Researchers demonstrated that these AI checks, designed to ensure compliance with age restrictions, may not be as secure as intended. The implications of this vulnerability could be serious, as it allows minors to bypass safeguards meant to protect them. Companies that implement age-verification measures need to reassess their systems to ensure they cannot be easily tricked and to better protect their users.

May 15, 2026

Unpatched Microsoft Exchange Server vulnerability exploited (CVE-2026-42897)

Help Net Security

Microsoft has issued a warning about a serious cross-site scripting (XSS) vulnerability, identified as CVE-2026-42897, affecting on-premises versions of Microsoft Exchange Server. This vulnerability allows unauthorized attackers to spoof users over a network, posing significant risks to organizations that have not yet applied any fixes. The affected versions include Microsoft Exchange Server Subscription Edition RTM, 2019, and 2016, while Exchange Online remains unaffected. Microsoft is currently working on a permanent fix, but until it is released, they have provided temporary mitigations for users to implement. Organizations using the affected versions should take immediate action to safeguard their systems from potential exploitation.

May 15, 2026

TeamPCP Ups the Game, Releases Shai-Hulud Worm’s Source Code

SecurityWeek

The hacking group TeamPCP has released the source code for a piece of malware called the Shai-Hulud Worm. This release is particularly concerning as the group is actively encouraging other cybercriminals to utilize the code for supply chain attacks, even offering monetary rewards for successful exploits. Such attacks can have serious implications, as they target the software and services that organizations rely on, potentially compromising a wide range of systems. By making this code publicly available, TeamPCP is increasing the risk of these types of attacks, which could affect various sectors that depend on secure supply chains. Organizations should be vigilant and review their security measures to mitigate potential risks associated with this malware.

May 15, 2026

China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer

Infosecurity Magazine

Hackers believed to be linked to China have targeted the Indian branch of a major global manufacturer using a new type of malware called TencShell. This malware is based on an open-source offensive toolkit, which suggests that the attackers are utilizing publicly available resources to carry out their operations. The implications of this attack are significant, as it not only affects the manufacturer but also raises concerns about the security of global supply chains. Companies operating in similar sectors should be vigilant, as this incident could indicate a broader trend of targeting multinational firms. The incident underscores the need for enhanced cybersecurity measures across industries to protect against sophisticated attacks.

May 15, 2026

Chrome 148 Update Patches Critical Vulnerabilities

SecurityWeek

Google's latest Chrome update, version 148, addresses several critical vulnerabilities, including a serious use-after-free issue affecting various browser components. This type of vulnerability can allow attackers to execute arbitrary code, potentially leading to unauthorized access or data breaches. Users of Chrome should update to the latest version to ensure their browsers are secure. Keeping browsers up to date is crucial, as these vulnerabilities can be exploited if left unpatched. The update underscores the ongoing need for vigilance in cybersecurity, especially given the frequency of browser-based attacks.

May 15, 2026