{"id":237177,"date":"2026-05-14T22:23:19","date_gmt":"2026-05-15T03:23:19","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2026\/05\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges"},"modified":"2026-05-14T22:23:19","modified_gmt":"2026-05-15T03:23:19","slug":"new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2026\/05\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges","title":{"rendered":"New Fragnesia Linux flaw lets attackers gain root privileges"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges.jpg\"><\/a><\/p>\n<p>Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability that allows attackers to run malicious code as root.<\/p>\n<p>Known as <a href=\"https:\/\/github.com\/v12-security\/pocs\/tree\/main\/fragnesia\" target=\"_blank\" rel=\"nofollow noopener\">Fragnasia<\/a> and tracked as <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2026-46300\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026\u201346300<\/a>, this security flaw stems from a logic bug in the Linux XFRM ESP-in-TCP subsystem that can enable unprivileged local attackers to gain root privileges by writing arbitrary bytes to the kernel page cache of read-only files.<\/p>\n<p>Zellic\u2019s head of assurance, <a href=\"https:\/\/twitter.com\/wcbowling?lang=en\" target=\"_blank\" rel=\"nofollow noopener\">William Bowling<\/a>, who discovered this new universal local privilege escalation flaw, also shared a proof-of-concept (PoC) exploit that achieves a memory-write primitive in the kernel that is used to corrupt the page cache memory of the \/usr\/bin\/su binary to get a shell with root privileges on vulnerable systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability that allows attackers to run malicious code as root. Known as Fragnasia and tracked as CVE-2026\u201346300, this security flaw stems from a logic bug in the Linux XFRM ESP-in-TCP subsystem that can enable unprivileged local attackers to gain root privileges by [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1492],"tags":[],"class_list":["post-237177","post","type-post","status-publish","format-standard","hentry","category-computing","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/237177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=237177"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/237177\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=237177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=237177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=237177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}