The CVE-2026-46300 vulnerability, dubbed Fragnesia, allows an unprivileged local attacker to gain root privileges by corrupting the Linux kernel page cache. The bug affects the XFRM ESP-in-TCP subsystem and has a CVSS 7.8 score. A patch is available, a public proof-of-concept (PoC) exploit has been released, but at the time of writing no active exploitation in the wild has been observed. Administrators of Linux servers, container platforms, and cloud environments need to install kernel updates or apply workarounds similar to the recommendations for Dirty Frag.
Technical details of the vulnerability
Fragnesia was discovered by researcher William Bowling from the V12 Security team. According to the researchers, the vulnerability is a logic flaw in the Linux kernel XFRM ESP-in-TCP subsystem that allows arbitrary byte writes to the kernel page cache for files that are otherwise read-only. A key characteristic is that exploitation does not require race conditions, which makes the attack deterministic and reliable.
As Wiz describes, the attack mechanism boils down to corrupting the page cache of the binary /usr/bin/su, allowing an unprivileged user to obtain root access. According to V12 Security, unlike Dirty Frag, exploiting Fragnesia does not require host-level privileges.
Fragnesia is a separate vulnerability from Dirty Frag and Copy Fail (CVE-2026-31431), but all three exploit the same attack surface—the ESP/XFRM subsystem—and use a similar memory write primitive to escalate privileges. A dedicated patch has been released for Fragnesia.
Affected systems
Security advisories or entries in vulnerability trackers have been published for the following distributions:
Exploitation status
The V12 Security team has published a working PoC exploit. Microsoft has reported that, as of publication time, no active exploitation in the wild has been observed. Nevertheless, the availability of a public PoC significantly lowers the barrier to entry for attackers and makes prompt patching critically important.
Relation to previous vulnerabilities and context
Fragnesia is part of a series of vulnerabilities in the Linux kernel ESP/XFRM subsystem discovered over a short period. Copy Fail (CVE-2026-31431) and Dirty Frag were disclosed earlier, and all three bugs exploit the same kernel component to achieve writes to the page cache. This points to a systemic issue in how ESP-in-TCP packet fragmentation is handled—an area of code that will likely require deeper auditing.
According to Wiz, the fundamental difference between Fragnesia and Dirty Frag is that exploiting Fragnesia does not require host-level privileges. This broadens the pool of potential attackers: the vulnerability can be used from within a container or by a regular user without additional preconditions.
Impact assessment
The vulnerability poses a high risk for the following scenarios:
- Multi-user servers — any local user with shell access can obtain root
- Container environments — in the absence of additional isolation, breakout from a container to the host level is possible
- Cloud instances — especially critical for providers that give customers shell access
- CI/CD systems — arbitrary code execution in pipelines can lead to compromise of the entire build infrastructure
The deterministic nature of exploitation (no need for race conditions) makes the attack stable and reproducible, which increases the likelihood of its use once a public PoC is available.
Security recommendations
Priority 1 — update the kernel. Install a patched kernel for your distribution. Links to advisories are provided above.
Priority 2 — workarounds (if immediate updating is not possible):
- Disable the
esp4,esp6kernel modules and related XFRM/IPsec functionality if it is not in use - Restrict access to a local shell—minimize the number of users with interactive access to the system
- Strengthen isolation of container workloads
- Configure monitoring for anomalous privilege-escalation events
According to a statement from CloudLinux, organizations that have already applied Dirty Frag workarounds are also protected against Fragnesia until patched kernels are released. Red Hat is assessing whether existing measures apply to CVE-2026-46300.
According to Wiz, AppArmor restrictions on unprivileged user namespaces can serve as a partial mitigation, as successful exploitation in this case would require additional bypasses. However, relying solely on AppArmor is not recommended.
Three privilege-escalation vulnerabilities in a single kernel subsystem over a short period are a signal that a systemic security approach is needed. Organizations should not only install the current patch for CVE-2026-46300, but also disable unused ESP/XFRM functionality at the kernel configuration policy level to reduce the attack surface for potential future vulnerabilities in this component.