Vulnerabilities & CVEs

Fragnesia CVE-2026-46300: New Linux Kernel Exploit FAQ

A fresh vulnerability, dubbed Fragnesia, has surfaced in the Linux kernel, allowing local attackers to escalate privileges to root. This isn't just a theoretical threat; a proof-of-concept is already out there.

Abstract representation of network data packets being processed, with a highlight on a vulnerable segment.

Key Takeaways

  • Fragnesia (CVE-2026-46300) is a new high-severity Linux kernel local privilege escalation vulnerability.
  • A public proof-of-concept (PoC) exploit is available and confirmed working on Ubuntu.
  • Fragnesia is distinct from Dirty Frag, requiring its own kernel patch; Dirty Frag patches do not fix it.
  • A kernel patch was released on May 13, and distributions like AlmaLinux and Fedora have already provided fixes.
  • For immediate mitigation on unpatched systems, module blacklisting (`rmmod esp4 esp6 rxrpc`) is effective.

The blinking cursor on a sysadmin’s terminal screen—a mundane reality for many—just got a lot more interesting. A new local privilege escalation exploit for the Linux kernel, codenamed Fragnesia, has emerged from the shadows, and it’s got security researchers buzzing. This isn’t just another bug; we’re talking about a fundamental shift in how attackers can potentially gain the keys to the kingdom on vulnerable systems.

The Kernel’s Forgotten Fragment

So, what is Fragnesia, really? Think of the Linux kernel as an incredibly efficient chef juggling multiple orders in a busy kitchen. It uses something called socket buffers (skbs) to shuttle data around. When it needs to combine fragments of data—say, two pieces of a network packet—it uses a trick called skb_try_coalesce(). Normally, it’s smart about this, marking certain shared data pages so it doesn’t accidentally overwrite something important. Fragnesia, however, exploits a moment where the kernel gets a little forgetful. It fails to properly mark a shared fragment after coalescing, leading the kernel to believe it’s safe to write directly into these shared pages. It’s like the chef, in a rush, serving soup in a bowl that’s still being washed.

This flaw, tracked as CVE-2026-46300, allows a local user—someone already on the system, not necessarily an external hacker—to trick the kernel into overwriting critical parts of the page cache. And what can be overwritten there? Almost anything that’s readable by the attacker, including binaries like /usr/bin/su, the very command used to become root. The impact? Local users can essentially rewrite these files in memory, granting themselves administrator privileges. The best part for the attacker? The original file on disk remains untouched, and a simple reboot or cache flush can make the exploit disappear without a trace. It’s a ghost in the machine, leaving no fingerprints on the hardware.

How Fragnesia Compares to Its Infamous Cousin

Fragnesia isn’t the first kid on the block to exploit the kernel’s XFRM (IPsec Transform Mode) ESP-in-TCP subsystem. The notorious Dirty Frag vulnerability (CVE-2026-43284/43500) used a similar playground. However, don’t let the family resemblance fool you; they’re distinct beasts. While both play in the same subsystem, Dirty Frag involved a more direct page-cache write, whereas Fragnesia use TCP coalescing and a transition in the ESP-in-TCP User Mode Linux (UML) mode. The write primitive is different too: Dirty Frag used a 4-byte store, but Fragnesia employs a 192-byte XOR via an AES-GCM keystream. The crucial point? The patches for Dirty Frag do not fix Fragnesia. You need a separate, specific patch for this new threat.

A Public Proof-of-Concept? That’s Bold.

And here’s where the energy in the room spikes. A public proof-of-concept (PoC) is already available on GitHub. This means that, theoretically, anyone with a bit of technical know-how and a vulnerable system can replicate the exploit. While no reports of this vulnerability being exploited “in the wild” have surfaced yet—which is always a relief—the existence of a readily available PoC dramatically lowers the barrier to entry for potential attackers. It’s like leaving a fully loaded toolkit on the doorstep of a burglar. William Bowling of V12 Security dropped this alongside a kernel patch on May 13, and the CVE was assigned the same day. It’s a swift, almost alarming, pace.

Who’s Affected and Who’s Safe?

Fragnesia casts a wide net, affecting the same kernel versions as Dirty Frag. Any distribution shipping a kernel without the May 13 patch is potentially vulnerable. The exploit has been confirmed working on Ubuntu’s 6.8.0-111-generic kernel. Here’s a snapshot of the landscape:

  • Ubuntu: Vulnerable, with patches pending evaluation.
  • Red Hat Enterprise Linux: Vulnerable.
  • openSUSE: Vulnerable.
  • CentOS Stream: Vulnerable.
  • Debian: Vulnerable.
  • Gentoo: Vulnerable.
  • AlmaLinux: Patched with specific kernel versions released.
  • CloudLinux: Patching; livepatches in validation.
  • Fedora: Patched.
  • Amazon Linux: Not affected, as it doesn’t ship the espintcp module.

It’s a patchwork of security statuses, and that’s precisely why staying updated and informed is paramount. The fact that Amazon Linux, a platform often used in cloud environments, is unaffected is a notable point of differentiation, likely due to its specific module configurations.

The Patchwork Quilt: Getting Ahead of Fragnesia

The good news? A patch is available. Submitted to the netdev mailing list on May 13, it ensures that skb_try_coalesce() correctly propagates the SKBFL_SHARED_FRAG marker, closing that forgetful loop. Distributions like AlmaLinux and Fedora have already pushed out patched kernels. For those who can’t immediately update their kernel—a common challenge in large enterprises or sensitive environments—the module blacklist mitigation used for Dirty Frag also works here. Simply removing the esp4, esp6, and rxrpc modules can provide a layer of defense. It’s a temporary shield, but a shield nonetheless. The exploit doesn’t rely on a race condition and can use user and network namespaces (enabled by default) to achieve CAP_NET_ADMIN without prior elevated host privileges, making its impact far-reaching for an unprivileged local user.

My Bold Prediction: This is Just the Beginning

What fascinates me about Fragnesia, beyond its technical cleverness, is what it portends. We’re witnessing a new era of vulnerability discovery, one where subtle, complex interactions within core kernel subsystems are becoming prime targets. This isn’t merely about fixing bugs anymore; it’s about understanding the emergent behaviors of incredibly complex systems. Each new exploit like Fragnesia or Dirty Frag feels like peering into the deeper currents of the digital ocean, revealing vulnerabilities born not of simple errors, but of complex design choices interacting in unforeseen ways. I believe we’re only scratching the surface of what these sophisticated kernel interactions can yield, and the proactive patching and analysis we’re seeing from vendors like Tenable are essential. The future of kernel security will be less about individual fixes and more about a holistic understanding of these complex software ecosystems, a truly exciting—and slightly terrifying—prospect.


🧬 Related Insights

Frequently Asked Questions

What is Fragnesia? Fragnesia (CVE-2026-46300) is a local privilege escalation vulnerability in the Linux kernel’s XFRM ESP-in-TCP subsystem that allows a local user to gain root access by overwriting critical files in memory.

Does the Dirty Frag patch fix Fragnesia? No, the patches for Dirty Frag do not address Fragnesia. A separate, specific kernel patch is required.

How can I mitigate Fragnesia if I can’t patch immediately? If an immediate kernel update isn’t possible, you can use the module blacklist mitigation by removing the esp4, esp6, and rxrpc modules from your system.

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

What is Fragnesia?
Fragnesia (CVE-2026-46300) is a local privilege escalation vulnerability in the Linux kernel's XFRM ESP-in-TCP subsystem that allows a local user to gain root access by overwriting critical files in memory.
Does the Dirty Frag patch fix Fragnesia?
No, the patches for Dirty Frag do not address Fragnesia. A separate, specific kernel patch is required.
How can I mitigate Fragnesia if I can't patch immediately?
If an immediate kernel update isn't possible, you can use the module blacklist mitigation by removing the `esp4`, `esp6`, and `rxrpc` modules from your system.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Tenable Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.