A newly discovered Linux kernel flaw, tracked as CVE-2026-46300, allows attackers to gain root-level access by exploiting a local privilege escalation vulnerability. This bug, dubbed Fragnesia, enables unprivileged users to corrupt page cache memory, effectively granting them elevated privileges. Public proof-of-concept exploit code is already available on GitHub, demonstrating the vulnerability's potential to spawn a root shell. The vulnerability was discovered by William Bowling of the V12 security team and analyzed by researchers at Wiz. Fragnesia is particularly concerning as it can be exploited by attackers to gain complete control over a Linux system1. This vulnerability is currently under discussion by Google, and its exploitation status will determine whether immediate patching or continued monitoring is necessary. The existence of Fragnesia and its potential for exploitation underscores the importance of prompt patching and vulnerability management for Linux administrators.
Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access
⚡ High Priority
Why This Matters
CVE-2026-46300 is in active discussion involving Google — exploitation status determines whether this is patch-now or monitor.
References
- The Register. (2026, May 14). Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access. *The Register*. https://www.theregister.com/security/2026/05/14/dirty-frag-gets-a-sequel-as-fragnesia-hands-linux-attackers-root-level-access/5240270
Original Source
The Register
Read original →