Canadian Cyber Security Journal
SOCIAL:
Filed under: Featured, TechTalk

Fragnesia CVE-2026-46300: New Linux Kernel LPE Born From a Security Patch — What Canadian Organizations Must Do Now

What Happened

Researcher William Bowling of the V12 security team disclosed CVE-2026-46300, a new Linux kernel local privilege escalation vulnerability that received the name Fragnesia. The flaw was not present in the original codebase — it was introduced by the patch applied to fix Dirty Frag (CVE-2026-43284 and CVE-2026-43500), the Linux zero-day disclosed on May 8, 2026.

The root of the vulnerability lies in the kernel’s XFRM ESP-in-TCP subsystem. The function skb_try_coalesce() fails to propagate the SKBFL_SHARED_FRAG marker when transferring paged fragments between socket buffers. When a TCP socket transitions into ESP-in-TCP mode after file data has been spliced into the receive queue, the kernel mistakes those queued file-backed pages for ESP ciphertext and decrypts them in place. An attacker who controls the IV nonce turns this into a one-byte arbitrary write into the page cache of any readable file.

Bowling published a working proof-of-concept that targets /usr/bin/su directly, writing a 192-byte position-independent ELF stub into the page-cache copy of the binary. The next call to su executes it as root. Affected distributions include Ubuntu, Debian, RHEL, AlmaLinux, openSUSE, CentOS, Fedora, and Arch Linux. All kernels that received the Dirty Frag fix but predate the Fragnesia patch are vulnerable. Kernels that never received the Dirty Frag patch are also exposed to both flaws simultaneously.

Patched kernel builds began rolling out on May 13, 2026, with most major distributions publishing updated packages within 24 hours. According to reporting by SecurityWeek and The Hacker News, the flaw carries a CVSS score of 7.8. No active exploitation in the wild has been confirmed as of disclosure, but the public proof-of-concept lowers the barrier to attack to near zero.

Why This Matters for Canadian Organizations

Canadian organizations run Linux across a wide range of environments — cloud workloads, containerized applications, healthcare imaging systems, government web infrastructure, financial back-end processing, and critical infrastructure control systems. Any server or workstation running an unpatched kernel version that received the Dirty Frag fix between May 8 and approximately May 13, 2026, is now exposed to a local privilege escalation with a working public exploit.

The fact that Fragnesia was introduced by a security patch — not an oversight in original code — is a significant operational concern. Organizations that applied the Dirty Frag patch as an emergency fix without yet deploying Fragnesia patches face a brief window where their patching work has created a new exposure. This is directly relevant to any Canadian organization that prioritized Dirty Frag remediation following the Canadian Centre for Cyber Security advisories on CVE-2026-43284 and CVE-2026-43500 earlier this month.

Under PIPEDA, a local privilege escalation with a public exploit on internet-facing infrastructure warrants formal risk assessment. If an attacker with limited access to a Linux host exploits Fragnesia to gain root, the subsequent scope of data access is organization-wide. Canadian federal departments and Crown corporations with compliance obligations under the Treasury Board of Canada Secretariat Directive on Security Management should treat this as a high-priority patching event.

What to Do

Apply kernel updates from your Linux distribution vendor immediately. AlmaLinux and CloudLinux have already published patched kernel packages. Verify your installed kernel version against the fixed versions published by your distro’s security advisory feed. If you cannot patch immediately, the interim mitigation is to denylist or unload the vulnerable modules: esp4, esp6, and rxrpc. Check your CISA KEV deadlines — CVE-2026-31431 (Copy Fail), the prior Linux kernel LPE, carried a May 15, 2026 federal deadline; treat Fragnesia with comparable urgency. Audit any automated patching pipelines to confirm the updated kernel package has been deployed and verify with a kernel version check after reboot.

Enjoy this article? Don’t forget to share.