Dirty Frag Gets a Sequel as Fragnesia Hands Linux Attackers Root-Level Access
Zellic says the flaw affects kernels released before May 13 and comes with a proof-of-concept exploit that can corrupt protected system files.
10 Articles
10 Articles
Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access
Linux admins hoping Dirty Frag was a one-off horror from the kernel networking stack are about to have a considerably worse week. Researchers at Wiz have published an analysis of "Fragnesia," a Linux kernel local privilege escalation flaw discovered by William Bowling of the V12 security team that allows unprivileged users to gain root by corrupting page cache memory. The bug, tracked as CVE-2026-46300, has public proof-of-concept exploit code d…
New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption
Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a span of two weeks. Codenamed Fragnesia, the security vulnerability is tracked as CVE-2026-46300 (CVSS score: 7.8) and is rooted in the Linux kernel's XFRM
A high-risk local privilege escalation vulnerability, "Fragnesia," has recently been disclosed in the Linux kernel. Kernel versions affected by Dirty Frag may also be impacted. Fragnesia is a similar issue to Dirty Frag and is a vulnerability found in ESP/
New Linux Kernel Vulnerability Enables Root Access
A newly disclosed Linux kernel vulnerability dubbed Fragnesia allows any local unprivileged user to escalate privileges to root without requiring a race condition, making it one of the more reliable local privilege escalation exploits seen in recent years. Discovered by William Bowling of the V12 security team, Fragnesia joins a growing class of dangerous kernel
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium





