Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Linux Kernel Flaw Grants Root Access Easily

Critical Linux Kernel Flaw Grants Root Access Easily

Posted on May 13, 2026 By CWS

A newly identified vulnerability in the Linux kernel, named Fragnesia, allows local users without privileges to gain root access, posing a significant threat to system security. This flaw is notable for not requiring a race condition, enhancing its reliability compared to similar exploits.

Discovery and Nature of Fragnesia

Fragnesia was discovered by William Bowling of the V12 security team. It is part of a growing category of serious kernel vulnerabilities that challenge existing Linux security protocols. This particular bug is part of the Dirty Frag class, related to the well-known Dirty Pipe and Copy Fail bugs, but it targets a different logic flaw in the Linux XFRM ESP-in-TCP subsystem.

The vulnerability exploits a kernel error where it fails to recognize shared fragments during the coalescing of socket buffers, inadvertently corrupting memory it should not access.

Mechanism of the Exploit

Fragnesia leverages a logic flaw in the handling of ESP-in-TCP ULP mode by the kernel. When a TCP socket shifts to espintcp ULP after data is already queued, the kernel erroneously processes the pages as ESP ciphertext. This results in an AES-GCM keystream byte being XORed into a read-only file’s kernel page cache without needing a race condition.

The exploit is executed by constructing a 256-entry lookup table of possible keystream bytes, allowing an attacker to alter any byte in a cached file by selecting the right nonce. This method enables the overwriting of the first 192 bytes of /usr/bin/su with a malicious ELF stub that elevates privileges and opens a root shell.

Impact and Mitigation Strategies

All Linux kernels affected by Dirtyfrag are susceptible, specifically those before May 13, 2026. While a patch has been submitted, systems remain at risk until it is applied. Administrators should immediately remove the vulnerable ESP modules using:

  • rmmod esp4 esp6 rxrpc
  • printf ‘install esp4 /bin/falseninstall esp6 /bin/falseninstall rxrpc /bin/false’ > /etc/modprobe.d/dirtyfrag.conf

It’s crucial to flush the page cache to prevent persistence of the exploit, using echo 1 | tee /proc/sys/vm/drop_caches or rebooting the system. A proof-of-concept is publicly available on GitHub, emphasizing the urgency for immediate action by organizations to patch affected systems.

Stay updated on this and other security issues by following us on platforms like Google News, LinkedIn, and X.

Cyber Security News Tags:Cybersecurity, Dirty Frag, ESP modules, ESP-in-TCP, Exploit, GitHub, Kernel, Linux, Linux servers, proof-of-concept, root access, security patch, system administrators, Vulnerability, William Bowling

Post navigation

Previous Post: Explore ROI for Cyber-Physical Security in Live Webinar
Next Post: Microsoft’s AI MDASH System Detects 16 Windows Vulnerabilities

Related Posts

How to Solve Alert Overload in Your SOC How to Solve Alert Overload in Your SOC Cyber Security News
MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets Cyber Security News
OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes Cyber Security News
Critical Chrome 0-Day Flaws Demand Immediate Action Critical Chrome 0-Day Flaws Demand Immediate Action Cyber Security News
DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots Cyber Security News
DeepLoad Malware Utilizing AI Evasion Tactics in Networks DeepLoad Malware Utilizing AI Evasion Tactics in Networks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Outlook Vulnerability Poses Serious Risk to Enterprises
  • Microsoft’s AI MDASH System Detects 16 Windows Vulnerabilities
  • Critical Linux Kernel Flaw Grants Root Access Easily
  • Explore ROI for Cyber-Physical Security in Live Webinar
  • Why Most Security Fixes Fail Without Proper Validation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Outlook Vulnerability Poses Serious Risk to Enterprises
  • Microsoft’s AI MDASH System Detects 16 Windows Vulnerabilities
  • Critical Linux Kernel Flaw Grants Root Access Easily
  • Explore ROI for Cyber-Physical Security in Live Webinar
  • Why Most Security Fixes Fail Without Proper Validation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark