{"vulnerability": "CVE-2026-46300", "sightings": [{"uuid": "336f44c4-17b1-4242-b001-58393d1d5c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/wdormann.infosec.exchange.ap.brid.gy/post/3mlqqk6pezwi2", "content": "Are you losing track of the Linux LPEs these days?\nGood. Me too.\n\nHere we have fragnesia.\n\nIt has been said that `CVE-2026-46300 has been assigned for this issue`, except that it hasn't. At least not yet.\n\nUbuntu (and Debian?) isn't affected, due to default AppArmor rules.", "creation_timestamp": "2026-05-13T16:40:58.436769Z"}, {"uuid": "6d9e3de7-c18e-40ee-9b5b-afd2dd4aac75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3mlqp45cmyy2s", "content": "Officially lost track of Linux page cache LPE's:\n\n\n github.com -&gt; \n\nThis is CVE-2026-46300\n\n\nOriginal-&gt;", "creation_timestamp": "2026-05-13T16:13:56.330753Z"}, {"uuid": "76ea6577-cb1e-45bf-b0e3-7baf08b7a5be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/threatintel.microsoft.com/post/3mlretfixji2z", "content": "A new variant of the recent Dirty Frag vulnerability, named Fragnesia (CVE-2026-46300), has been discovered in the Linux XFRM ESP-in-TCP subsystem. Similar to Dirty Frag, Fragnesia exploits a vulnerability in the XFRM ESP-in-TCP subsystem to achieve a memory write primitive in the kernel. ", "creation_timestamp": "2026-05-13T22:42:45.552088Z"}, {"uuid": "80084f83-bc1d-479b-8b0a-964f26bf5110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/forst.mastodon.social.ap.brid.gy/post/3mlqqm6jkqdh2", "content": "Apparently yet another one of those #CopyFail #DirtyFrag-like vulnerabilities in #Linux\n\nCVE-2026-46300\n\nhttps://www.openwall.com/lists/oss-security/2026/05/13/3", "creation_timestamp": "2026-05-13T16:41:34.027990Z"}, {"uuid": "4eed6e3a-e699-4bd4-b024-7ee0d3d5724d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3mlrincgw3e2o", "content": "A new variant of the recent Dirty Frag vulnerability, named Fragnesia (CVE-2026-46300), has been discovered in the Linux XFRM ESP-in-TCP subsystem. Similar to Dirty Frag, Fragnesia exploits a vulner\u2026\n\n\ud83d\udd01 RT @MsftSecIntel | reposted by @rootsecdev\nhttps://x.com/MsftSecIntel/status/2054701609024934064", "creation_timestamp": "2026-05-13T23:50:55.765698Z"}, {"uuid": "81cbaaf1-98a5-4569-8acf-c429748bc4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/kzkr.xyz/post/3mlre446mres2", "content": "\u771f\u3063\u8d64\u3084\u306d\nhttps://security-tracker.debian.org/tracker/CVE-2026-46300", "creation_timestamp": "2026-05-13T22:34:10.250419Z"}, {"uuid": "cc7bcf0e-1d3d-442e-94be-9fe0407174c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mlrrkr5rym2j", "content": "Top 3 CVE for last 7 days:\nCVE-2026-43284: 134 interactions\nCVE-2026-43500: 99 interactions\nCVE-2026-31431: 73 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-46300: 14 interactions\nCVE-2026-42945: 7 interactions\nCVE-2025-8088: 6 interactions\n", "creation_timestamp": "2026-05-14T02:30:34.637472Z"}, {"uuid": "0fecc3bf-e897-482b-a795-b42b234b2bb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/metronom.bsky.social/post/3mlrskyrevc22", "content": "CVE-2026-46300. YellowKey (github.com/Nightmare-Ec...) \u0443 \u044f\u043a\u043e\u0433\u0430 \u045e\u0432\u043e\u0433\u0443\u043b\u0435 \u044f\u0448\u0447\u044d \u043d\u044f\u043c\u0430 CVE + \u0414\u0437\u0435\u043d\u044c \u0442\u043e\u043b\u044c\u043a\u0456 \u043f\u0430\u0447\u0430\u045e\u0441\u044f.", "creation_timestamp": "2026-05-14T02:49:03.331799Z"}, {"uuid": "37333e6f-3b56-45af-b46b-5910e6c06f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mls62ixesc2k", "content": "Fragnesia (CVE-2026-46300): \u65e0\u7ade\u4e89\u6761\u4ef6\u7684\u5185\u5b58\u4efb\u610f\u5199\u5165 root\u00a0\u63d0\u6743\u6f0f\u6d1e\u5206\u6790\n\n\u5f15\u8a00 Fragnesia\uff08\u7f16\u53f7 CVE-2026-46300\uff09\uff0c\u4ea6\u79f0 Copy Fail 3.0\uff0c\u662f Linux \u5185\u6838 XFRM ESP-in-TCP \u5b50\u7cfb\u7edf\u4e2d\u65b0\u53d1\u73b0\u7684\u4e00\u4e2a\u672c\u5730\u63d0\u6743\u6f0f\u6d1e\u3002\u4e0e Dirty Pipe \u7b49\u4f20\u7edf\u6f0f\u6d1e\u4e0d\u540c\uff0cFragnesia \u4e0d\u4f9d\u8d56\u4efb\u4f55\u7ade\u4e89\u6761\u4ef6\uff0c\u80fd\u591f\u5b9e\u73b0\u786e\u5b9a\u6027\u3001\u9ad8\u6210\u529f\u7387\u7684\u653b\u51fb\uff0c\u4efb\u4f55\u672a\u7ecf\u6388\u6743\u7684\u672c\u5730\u7528\u6237\u5747\u53ef\u501f\u6b64\u7a33\u5b9a\u83b7\u53d6 root \u6700\u9ad8\u6743\u9650\u3002 \u5b66\u4e60\u76ee\u6807 \u7406\u89e3 Fragnesia \u6f0f\u6d1e\u7684\u6280\u672f\u539f\u7406\u53ca\u5176\u4e0e Dirty Frag / Copy Fail \u6f0f\u6d1e\u5bb6\u65cf\u7684\u5173\u7cfb\u2026", "creation_timestamp": "2026-05-14T06:14:07.878856Z"}, {"uuid": "0d348022-dad1-40b3-bca4-a9ea85dfab39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3mlscdil7ah26", "content": "Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300)  that allows attackers to run malicious code as root.", "creation_timestamp": "2026-05-14T07:31:05.571427Z"}, {"uuid": "80530dc9-b1d4-4e88-92ea-2a00df0af9b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/thehackernews/8998", "content": "\ud83d\uded1 3rd Linux kernel LPE in just ~2 weeks: Fragnesia (CVE-2026-46300) just dropped.\n\nAttackers can now gain root by corrupting the kernel page cache through a flaw in XFRM ESP-in-TCP.\n\nPoC is public. Major distros have already issued advisories.\n\nDetails: https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html", "creation_timestamp": "2026-05-14T07:11:21.000000Z"}, {"uuid": "0b793206-f703-4546-b7e7-d7ac2fde9c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3mlsipwmkq52o", "content": "A new Linux kernel vulnerability dubbed \u201cFragnesia\u201d (CVE-2026-46300) allows unprivileged local attackers to gain root access. The bug is in [\u2026]", "creation_timestamp": "2026-05-14T09:27:10.693791Z"}, {"uuid": "af8062e1-0bbf-4510-bf37-f347ef25a232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/infosecbriefly.bsky.social/post/3mlsecdf5su2q", "content": "Fragnesia (CVE-2026-46300) enables unprivileged local attackers to corrupt kernel page cache and gain root via the XFRM ESP-in-TCP subsystem.\n", "creation_timestamp": "2026-05-14T08:06:10.970820Z"}, {"uuid": "21fe9cc3-733f-42c3-a18f-ac3b8d13a5e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlsonpdrtc2k", "content": "Linux\u30ab\u30fc\u30cd\u30eb\u306eFragnesia\u8106\u5f31\u6027(CVE-2026-46300)\u306f\u3001\u30da\u30fc\u30b8\u30ad\u30e3\u30c3\u30b7\u30e5\u7834\u640d\u306b\u3088\u308a\u30ed\u30fc\u30ab\u30eb\u653b\u6483\u8005\u304croot\u6a29\u9650\u3092\u596a\u53d6\u53ef\u80fd\u3002", "creation_timestamp": "2026-05-14T11:11:14.057205Z"}, {"uuid": "a7e36af2-0ffb-4b67-9418-52916093f810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/BleepingComputer/24675", "content": "\u200aNew Fragnesia Linux flaw lets attackers gain root privileges\n\nLinux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300)  that allows attackers to run malicious code as root. [...]\n\nhttps://www.bleepingcomputer.com/news/security/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges/", "creation_timestamp": "2026-05-14T07:53:11.000000Z"}, {"uuid": "2eb88b1d-8487-4381-b860-98712e75c201", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/GithubRedTeam/84181", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-46300\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Sentebale\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-14 07:53:48\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-14T08:00:04.000000Z"}, {"uuid": "73df47a3-45b6-48df-9e67-2dd9b40a7b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/true_secator/8202", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432 Linux \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0442 \u043d\u0430\u0434 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044f\u0434\u0440\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 root.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430 \u043a\u0430\u043a\u00a0Fragnasia \u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2026-46300.\n\n\u041e\u043d\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 Linux XFRM ESP-in-TCP, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 root, \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0431\u0430\u0439\u0442\u044b \u0432 \u043a\u044d\u0448 \u0441\u0442\u0440\u0430\u043d\u0438\u0446 \u044f\u0434\u0440\u0430 \u0434\u043b\u044f \u0444\u0430\u0439\u043b\u043e\u0432 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f.\n\n\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0438\u0437 Zellic \u0423\u0438\u043b\u044c\u044f\u043c\u0443 \u0411\u043e\u0443\u043b\u0438\u043d\u0433\u0443, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0441\u044f PoC, \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044e\u0449\u0438\u043c \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u043f\u0430\u043c\u044f\u0442\u044c \u044f\u0434\u0440\u0430, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0439 \u0434\u043b\u044f \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043a\u044d\u0448\u0430 \u0441\u0442\u0440\u0430\u043d\u0438\u0446 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 /usr/bin/su \u0441 \u0446\u0435\u043b\u044c\u044e \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0442\u0438\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043a\u043b\u0430\u0441\u0441\u0443 Dirty Frag, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435, \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u044f\u0434\u0440\u0430 Linux, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0435 \u0434\u043e 13 \u043c\u0430\u044f 2026 \u0433\u043e\u0434\u0430.\n\n\u041a\u0430\u043a \u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 Fragnasia, \u0434\u043b\u044f Dirty Frag \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0439 PoC, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u0430\u0432 root \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430\u0445 Linux.\n\n\u041e\u0434\u043d\u0430\u043a\u043e Dirty Frag \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0437\u0430 \u0441\u0447\u0435\u0442 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f \u0434\u0432\u0443\u0445 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0434\u0440\u0430: \u043e\u0448\u0438\u0431\u043a\u0438 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043a\u044d\u0448 xfrm-ESP (CVE-2026-43284) \u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043a\u044d\u0448 RxRPC (CVE-2026-43500), \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043f\u0443\u0442\u0435\u043c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438.\n\nFragnesia \u0445\u043e\u0442\u044c \u0438 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043a\u043b\u0430\u0441\u0441\u0443 Dirty Frag, \u043d\u043e \u044d\u0442\u043e \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 ESP/XFRM, \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b \u0432\u044b\u043f\u0443\u0449\u0435\u043d \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u0430\u0442\u0447. \u041e\u0434\u043d\u0430\u043a\u043e \u043e\u043d\u0430 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u043d\u0430 \u0442\u043e\u0439 \u0436\u0435 \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u0438, \u0438 \u043c\u0435\u0440\u044b \u043f\u043e \u0435\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u0442\u0430\u043a\u0438\u0435 \u0436\u0435, \u043a\u0430\u043a \u0438 \u0434\u043b\u044f dirtyfrag.\n\n\u041e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 Linux XFRM ESP-in-TCP \u0434\u043b\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0431\u0430\u0439\u0442\u043e\u0432 \u0432 \u043a\u044d\u0448 \u0441\u0442\u0440\u0430\u043d\u0438\u0446 \u044f\u0434\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f, \u0431\u0435\u0437 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u043e\u0437\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f \u0433\u043e\u043d\u043a\u0438.\n\n\u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0430\u0442\u0430\u043a \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Linux \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u044f\u0434\u0440\u0430 \u0434\u043b\u044f \u0441\u0432\u043e\u0435\u0439 \u0441\u0440\u0435\u0434\u044b \u043b\u0438\u0431\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0442\u043e\u0442 \u0436\u0435 \u043c\u0435\u0442\u043e\u0434 \u0437\u0430\u0449\u0438\u0442\u044b, \u0447\u0442\u043e \u0438 \u0434\u043b\u044f \u043a\u043e\u043c\u0430\u043d\u0434 Dirty Frag, \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u044f\u0434\u0440\u0430.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e Fragnasia \u043f\u043e\u044f\u0432\u0438\u043b\u043e\u0441\u044c \u0438\u043c\u0435\u043d\u043d\u043e \u0432 \u0442\u043e\u0442 \u043c\u043e\u043c\u0435\u043d\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u0435\u0440\u0435\u0434 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432 Linux \u0441\u0442\u043e\u0438\u0442 \u0434\u0440\u0443\u0433\u0430\u044f \u043d\u0435 \u043c\u0435\u043d\u0435\u0435 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u0430\u044f \u0437\u0430\u0434\u0430\u0447\u0430 - \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u0442\u044c Copy Fail, \u0435\u0449\u0435 \u043e\u0434\u043d\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f.\n\n\u041f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u0432 \u0430\u043f\u0440\u0435\u043b\u0435\u00a0\u0432 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430\u0445 Linux \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430\u00a0\u0435\u0449\u0435 \u043e\u0434\u043d\u0443 EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c  (\u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 Pack2TheRoot) \u0432 \u0434\u0435\u043c\u043e\u043d\u0435 PackageKit, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0430\u0441\u044c \u043d\u0435\u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u043e\u0439 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u0435\u0441\u044f\u0442\u0438 \u043b\u0435\u0442.", "creation_timestamp": "2026-05-14T14:01:34.000000Z"}, {"uuid": "034cab27-6def-41c5-a439-655c8c033542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/linuxteck.bsky.social/post/3mlt4k7cl2k2v", "content": "Fragnesia (CVE-2026-46300) is a newly disclosed Linux kernel vulnerability tied to the XFRM ESP-in-TCP subsystem.\n\nPotential privilege escalation, page cache manipulation, and container security concerns.\n\nwww.linuxteck.com/fragnesia-cv...\n\n#Linux #CyberSecurity #LinuxKernel #LinuxTeck", "creation_timestamp": "2026-05-14T15:20:03.886350Z"}, {"uuid": "63fdb7dc-8668-4374-b2ab-3e87aaf9695d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "Telegram/8KrClztxOpt43Dn04vWbNfDSJz2auxqrQryTcHMCR_fwseY", "content": "", "creation_timestamp": "2026-05-14T15:00:07.000000Z"}, {"uuid": "f22c754c-6c6b-43a8-ae05-6cf5de9b045a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/habr_com_news/46492", "content": "\u041f\u043e\u0441\u043b\u0435\u00a0\u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438\u00a0\u043e LPE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (10 \u0441\u0442\u0440\u043e\u043a \u043a\u043e\u0434\u0430 \u043d\u0430 Python) Copy Fail \u0432 Linux \u2014 root \u043d\u0430 Linux \u0432 \u043e\u0434\u0438\u043d \u043a\u043b\u0438\u043a,\u00a0Copy Fail 2: Electric Boogaloo\u00a0\u0438\u00a0Dirty Frag: Universal Linux LPE, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e \u0418\u0411\u00a0\u043d\u0430\u0448\u043b\u0438\u00a0\u0435\u0449\u0451 \u043e\u0434\u043d\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Linux \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c\u00a0Fragnesia\u00a0(CVE-2026-46300) \u0438\u043b\u0438 Copy Fail 3.0. \u0421 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0443\u0440\u043e\u0432\u043d\u044f root.\u00a0\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c", "creation_timestamp": "2026-05-14T08:35:13.000000Z"}, {"uuid": "17000ac1-6294-494c-8074-f511c74febd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html", "content": "Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a span of two weeks.\nCodenamed Fragnesia, the security vulnerability is tracked as CVE-2026-46300 (CVSS score: 7.8) and is rooted in the Linux kernel's XFRM", "creation_timestamp": "2026-05-14T05:06:15.000000Z"}, {"uuid": "1ead7a3c-dfa6-4fb1-887e-a25c6db10899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlsosrhnso2f", "content": "Linux\u30ab\u30fc\u30cd\u30eb\u306e\u8106\u5f31\u6027\uff08CVE-2026-46300\uff09\u306b\u3088\u308a\u3001\u653b\u6483\u8005\u306froot\u6a29\u9650\u3067\u4e0d\u6b63\u30b3\u30fc\u30c9\u3092\u5b9f\u884c\u53ef\u80fd\u3002\u30c7\u30a3\u30b9\u30c8\u30ea\u30d3\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u4fee\u6b63\u30d1\u30c3\u30c1\u3092\u914d\u5e03\u4e2d\u3002", "creation_timestamp": "2026-05-14T11:14:01.699582Z"}, {"uuid": "71842d9a-40ad-40b2-a638-c39f25bb8749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "published-proof-of-concept", "source": "Telegram/K_yHCshI6yZBJj8Foftsx5hfP7GLhbMmJ81CYC3g7d-oupU", "content": "", "creation_timestamp": "2026-05-14T11:00:13.000000Z"}, {"uuid": "68908c18-547d-41b2-b217-85c09e3602f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://www.acn.gov.it/portale/w/fragnesia-poc-per-lo-sfruttamento-di-una-nuova-vulnerabilita-nel-kernel-linux", "content": "", "creation_timestamp": "2026-05-14T09:04:27.000000Z"}, {"uuid": "4b7025f4-3ad0-45d0-a59e-fddf0c8e9a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/echobit.de/post/3mlthd2agk222", "content": "Linux is most secure OS. Yes. It's perfectly safe\u2026\n\n- Dirty Cow (CVE-2016-5195)\n- Dirty Pipe (CVE-2022-0847)\n- io_uring UAF (CVE-2022-2602)\n- Copy Fail (CVE-2026-31431)\n- Dirty Frag (CVE-2026-43284\n- Fragnesia (CVE-2026-46300)\n\n\u2026 so you have that many methods to recover your root password. \ud83d\ude02", "creation_timestamp": "2026-05-14T18:34:52.034699Z"}, {"uuid": "7a212b0e-3a58-4ca4-9ac1-bb08677fbd1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/pixelsandpulse.bsky.social/post/3mltqmdjxhy2c", "content": "The Linux kernel faces a critical challenge with Fragnesia (CVE-2026-46300), an LPE that corrupts read-only files for root access. This isn't just a patch; it's a systemic issue in a 40M-line codebase. Why AI won't save us and\u2026\n\nhttps://www.tpp.blog/150qcdt\n\n#cybersecurity #linuxkernel #fragnesia", "creation_timestamp": "2026-05-14T21:18:52.681880Z"}, {"uuid": "47c9be0f-0a0a-4c08-9837-59f129804bba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116575285535687058", "content": "It is possible to see elevated activities targeting Linux Kernel (CVE-2026-46300) https://vuldb.com/vuln/363802/cti", "creation_timestamp": "2026-05-14T22:28:12.801965Z"}, {"uuid": "24ca564f-26eb-49a0-86a2-469f0e615dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3mluocb2lcc2e", "content": "Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)\n\n\ud83d\udcd6 Read more: www.helpnetsecurity.com/2026/05/14/f...\n\n#cybersecurity #cybersecuritynews #containers #Linux #exploit #PoC #vulnerability @vakzz.bsky.social", "creation_timestamp": "2026-05-15T06:10:10.824320Z"}, {"uuid": "792f5372-4e61-41b7-b262-084ec13fe369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-46300", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3mluqnaff3k2k", "content": "\ud83d\udcf0 Celah Kritis Linux \"Fragnesia\" (CVE-2026-46300) Mungkinkan Serangan Eskalasi Hak Akses Root\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/15/celah-kritis-linux-fragnesia-cve-2026-46300-akses-root/\n\n#beritaTeknologi #cve-2026-46300 #debian #dirtyFrag #fragnesia #keamananServe", "creation_timestamp": "2026-05-15T06:52:28.025000Z"}, {"uuid": "5267a8aa-1601-406e-94bf-1938d2c6d064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mlubzmjy2i2u", "content": "Top 3 CVE for last 7 days:\nCVE-2026-43284: 147 interactions\nCVE-2026-43500: 99 interactions\nCVE-2026-31431: 72 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-46300: 39 interactions\nCVE-2026-42945: 17 interactions\nCVE-2026-31431: 14 interactions\n", "creation_timestamp": "2026-05-15T02:30:32.394719Z"}, {"uuid": "4debfe7c-bbce-4703-b096-55fa5a154588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "Telegram/AnYB8BtzVBQ1MhrfiKuh_VS8O18hgBdtGlqDvMUeYDrZgg", "content": "", "creation_timestamp": "2026-05-14T08:31:20.000000Z"}, {"uuid": "32819b4c-7f9b-496b-b7a8-fd2d4fde9e79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mluiqe7zc22g", "content": "New Fragnesia Linux flaw lets attackers gain root privileges\n\nLinux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300) that allows attackers to run malicious code as root. [...]\n#hackernews #news", "creation_timestamp": "2026-05-15T04:30:37.373288Z"}, {"uuid": "ffee40c0-4f12-47e0-9bb2-bd9d47d1620c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/bdufstecru/3163", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 skb_try_coalesce() \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438\n\nBDU:2026-06785\nCVE-2026-46300\n\n\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f AlmaLinux:\nhttps://almalinux.org/blog/2026-05-13-fragnesia-cve-2026-46300/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2026-46300\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043c\u043e\u0434\u0443\u043b\u0435\u0439 ESP4, ESP6 \u0438 RxRPC;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 SIEM-\u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f (\u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438) \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.", "creation_timestamp": "2026-05-15T12:58:47.000000Z"}, {"uuid": "4489ce7e-ac7a-4842-9d3d-f23e18ca0899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/moselwal.de/post/3mlv3jwedxk2t", "content": "Fragnesia (CVE-2026-46300) \u2014 die dritte XFRM-LPE in drei Wochen\n\nmoselwal.de/blog/fragnes...", "creation_timestamp": "2026-05-15T10:07:12.194057Z"}, {"uuid": "ffd9861d-ee81-4999-9a8a-5742104f25c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://gist.github.com/lukapaunovic/fe02e3a4be7db4c080316fbfec3e50c5", "content": "#!/usr/bin/env bash\nset -Eeuo pipefail\n\n# Fragnesia / CVE-2026-46300 temporary mitigation for Debian 12 / bookworm.\n# This blocks esp4, esp6 and rxrpc from being loaded on the host kernel.\n#\n# Safe for typical QEMU/KVM VPS nodes that do not terminate IPsec/ESP on the host.\n# This can break host-level IPsec/strongSwan/Libreswan ESP usage, or AFS/rxrpc usage.\n\nCONF_FILE=\"/etc/modprobe.d/fragnesia.conf\"\nMODULE_PATTERN='^(esp4|esp6|rxrpc)\\b'\n\nif [[ \"${EUID}\" -ne 0 ]]; then\n    echo \"ERROR: Run this script as root.\"\n    exit 1\nfi\n\necho \"[1/6] Writing module block rules to ${CONF_FILE}\"\n\ncat &gt; \"${CONF_FILE}\" &lt;&lt;'EOF'\n# Fragnesia / CVE-2026-46300 temporary mitigation.\n# Blocks future loading of vulnerable modules through modprobe.\n\ninstall esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\nEOF\n\necho \"[2/6] Trying to unload modules if already loaded\"\n\nmodprobe -r esp4 esp6 rxrpc 2&gt;/dev/null || true\n\necho \"[3/6] Checking currently loaded modules\"\n\nif lsmod | grep -E \"${MODULE_PATTERN}\"; then\n    echo \"WARNING: One or more vulnerable modules are still loaded.\"\n    echo \"They may be in use by IPsec/ESP or rxrpc/AFS on this host.\"\nelse\n    echo \"OK: esp4/esp6/rxrpc not loaded\"\nfi\n\necho \"[4/6] Updating initramfs if update-initramfs exists\"\n\nif command -v update-initramfs &gt;/dev/null 2&gt;&amp;1; then\n    update-initramfs -u -k all\n    echo \"OK: initramfs updated\"\nelse\n    echo \"WARNING: update-initramfs not found, skipping\"\nfi\n\necho \"[5/6] Flushing filesystem buffers and dropping caches\"\n\nsync\necho 3 &gt; /proc/sys/vm/drop_caches\n\necho \"[6/6] Verifying that modules are blocked\"\n\nmodprobe esp4 2&gt;/dev/null || echo \"OK: esp4 blocked\"\nmodprobe esp6 2&gt;/dev/null || echo \"OK: esp6 blocked\"\nmodprobe rxrpc 2&gt;/dev/null || echo \"OK: rxrpc blocked\"\n\nif lsmod | grep -E \"${MODULE_PATTERN}\"; then\n    echo \"WARNING: Vulnerable module still loaded after mitigation.\"\n    echo \"Check host-level IPsec/ESP/rxrpc usage.\"\n    exit 2\nelse\n    echo \"OK: vulnerable modules not loaded\"\nfi\n\ncat &lt;&lt;'EOF'\n\nDone.\n\nDebian 12 / bookworm security repo and kernel update notes:\n\n1. Check current kernel:\n\n   uname -r\n\n2. Make sure Debian 12 security repo exists.\n\n   Official Debian 12 / bookworm security repo line:\n\n   deb http://security.debian.org/ bookworm-security main contrib non-free non-free-firmware\n\n   Example add command for classic /etc/apt/sources.list syntax:\n\n   grep -R \"bookworm-security\" /etc/apt/sources.list /etc/apt/sources.list.d/*.list /etc/apt/sources.list.d/*.sources 2&gt;/dev/null || \\\n   echo \"deb http://security.debian.org/ bookworm-security main contrib non-free non-free-firmware\" &gt;&gt; /etc/apt/sources.list\n\n3. Update package index:\n\n   apt update\n\n4. Upgrade currently available Debian 12 security/kernel packages:\n\n   apt install --only-upgrade linux-image-amd64 linux-headers-amd64\n\n   Or, if you want all available stable/security updates too:\n\n   apt upgrade\n\n5. If you are using Debian 12 backports kernel, for example:\n\n   6.12.x+deb12-amd64\n\n   then make sure bookworm-backports exists:\n\n   grep -R \"bookworm-backports\" /etc/apt/sources.list /etc/apt/sources.list.d/*.list /etc/apt/sources.list.d/*.sources 2&gt;/dev/null || \\\n   echo \"deb http://deb.debian.org/debian bookworm-backports main contrib non-free non-free-firmware\" &gt;&gt; /etc/apt/sources.list\n\n   Then update APT and install/upgrade kernel from backports:\n\n   apt update\n   apt install -t bookworm-backports linux-image-amd64 linux-headers-amd64\n\n6. If a new fixed kernel is installed, reboot into it:\n\n   reboot\n\n7. After reboot, verify:\n\n   uname -r\n   dpkg -l | grep -E '^ii\\s+linux-image'\n   lsmod | grep -E '^(esp4|esp6|rxrpc)\\b' || echo \"OK: vulnerable modules not loaded\"\n\n8. After Debian releases a fixed kernel for CVE-2026-46300, you can remove this temporary mitigation only if you need IPsec/ESP/rxrpc:\n\n   rm -f /etc/modprobe.d/fragnesia.conf\n   update-initramfs -u -k all\n   reboot\n\nImportant notes:\n\n- Do not add Debian 13 / trixie repositories to Debian 12 just to get a kernel fix.\n- For normal Debian 12 stable kernel, use bookworm-security.\n- For Debian 12 backports kernel, use bookworm-backports with apt install -t bookworm-backports.\n- Keep this mitigation enabled until the installed kernel is confirmed fixed.\n\nEOF", "creation_timestamp": "2026-05-15T08:41:14.000000Z"}, {"uuid": "93964a53-4d30-424b-afc6-3eaa33fe21f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://gist.github.com/lukapaunovic/0df878da26f324895ad252bd81a34b17", "content": "#!/usr/bin/env bash\nset -Eeuo pipefail\n\n# Fragnesia / CVE-2026-46300 temporary mitigation for Debian 13 / trixie.\n# This blocks esp4, esp6 and rxrpc from being loaded on the host kernel.\n#\n# Safe for typical QEMU/KVM VPS nodes that do not terminate IPsec/ESP on the host.\n# This can break host-level IPsec/strongSwan/Libreswan ESP usage, or AFS/rxrpc usage.\n\nCONF_FILE=\"/etc/modprobe.d/fragnesia.conf\"\nMODULE_PATTERN='^(esp4|esp6|rxrpc)\\b'\n\nif [[ \"${EUID}\" -ne 0 ]]; then\n    echo \"ERROR: Run this script as root.\"\n    exit 1\nfi\n\necho \"[1/6] Writing module block rules to ${CONF_FILE}\"\n\ncat &gt; \"${CONF_FILE}\" &lt;&lt;'EOF'\n# Fragnesia / CVE-2026-46300 temporary mitigation.\n# Blocks future loading of vulnerable modules through modprobe.\n\ninstall esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\nEOF\n\necho \"[2/6] Trying to unload modules if already loaded\"\n\nmodprobe -r esp4 esp6 rxrpc 2&gt;/dev/null || true\n\necho \"[3/6] Checking currently loaded modules\"\n\nif lsmod | grep -E \"${MODULE_PATTERN}\"; then\n    echo \"WARNING: One or more vulnerable modules are still loaded.\"\n    echo \"They may be in use by IPsec/ESP or rxrpc/AFS on this host.\"\nelse\n    echo \"OK: esp4/esp6/rxrpc not loaded\"\nfi\n\necho \"[4/6] Updating initramfs if update-initramfs exists\"\n\nif command -v update-initramfs &gt;/dev/null 2&gt;&amp;1; then\n    update-initramfs -u -k all\n    echo \"OK: initramfs updated\"\nelse\n    echo \"WARNING: update-initramfs not found, skipping\"\nfi\n\necho \"[5/6] Flushing filesystem buffers and dropping caches\"\n\nsync\necho 3 &gt; /proc/sys/vm/drop_caches\n\necho \"[6/6] Verifying that modules are blocked\"\n\nmodprobe esp4 2&gt;/dev/null || echo \"OK: esp4 blocked\"\nmodprobe esp6 2&gt;/dev/null || echo \"OK: esp6 blocked\"\nmodprobe rxrpc 2&gt;/dev/null || echo \"OK: rxrpc blocked\"\n\nif lsmod | grep -E \"${MODULE_PATTERN}\"; then\n    echo \"WARNING: Vulnerable module still loaded after mitigation.\"\n    echo \"Check host-level IPsec/ESP/rxrpc usage.\"\n    exit 2\nelse\n    echo \"OK: vulnerable modules not loaded\"\nfi\n\ncat &lt;&lt;'EOF'\n\nDone.\n\nDebian security repo and kernel update notes:\n\n1. Check current kernel:\n   uname -r\n\n2. Make sure Debian 13 security repo exists.\n   For classic /etc/apt/sources.list syntax, Debian 13 / trixie security repo is:\n\n   deb http://security.debian.org/ trixie-security main contrib non-free non-free-firmware\n\n   Example add command:\n\n   grep -R \"trixie-security\" /etc/apt/sources.list /etc/apt/sources.list.d/*.list /etc/apt/sources.list.d/*.sources 2&gt;/dev/null || \\\n   echo \"deb http://security.debian.org/ trixie-security main contrib non-free non-free-firmware\" &gt;&gt; /etc/apt/sources.list\n\n3. Update package index:\n\n   apt update\n\n4. Upgrade currently available security/kernel packages:\n\n   apt install --only-upgrade linux-image-amd64 linux-headers-amd64\n\n   Or, if you want all available security/stable updates too:\n\n   apt upgrade\n\n5. If a new fixed kernel is installed, reboot into it:\n\n   reboot\n\n6. After reboot, verify:\n\n   uname -r\n   dpkg -l | grep -E '^ii\\s+linux-image'\n   lsmod | grep -E '^(esp4|esp6|rxrpc)\\b' || echo \"OK: vulnerable modules not loaded\"\n\n7. After Debian releases a fixed kernel for CVE-2026-46300, you can remove this temporary mitigation only if you need IPsec/ESP/rxrpc:\n\n   rm -f /etc/modprobe.d/fragnesia.conf\n   update-initramfs -u -k all\n   reboot\n\nEOF", "creation_timestamp": "2026-05-15T08:36:34.000000Z"}, {"uuid": "9839de87-e396-4747-9da7-ce19507bbe98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/GithubRedTeam/84353", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-46300\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a 0xBlackash\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-15 15:59:40\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-46300\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-15T16:00:04.000000Z"}, {"uuid": "8c492dbe-1aa9-4646-bc36-7bcd8b7d021b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mlvnkrsydk2g", "content": "Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)\n\nResearchers have found and disclosed yet another local privilege escalation (LPE) vulnerability in the Linux kernel: CVE-2026-46300, aka \u201cFragnesia\u201d. The flaw is in the same class of vulnerabilit\u2026\n#hackernews #news", "creation_timestamp": "2026-05-15T15:29:38.817181Z"}, {"uuid": "bb8856d4-8cd9-4157-956e-e690c783e5a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mlvocqrczc2y", "content": "Alert: 'Fragnesia' Linux kernel vulnerability (CVE-2026-46300) allows local attackers to gain root access via page cache corruption. Apply patches or mitigations immediately. #Linux #CyberSecurity #Fragnesia Link: thedailytechfeed.com/fragnesia-vu...", "creation_timestamp": "2026-05-15T15:43:03.629679Z"}, {"uuid": "ac9272eb-84b4-4e61-8ff3-89e8daeedad8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/information_security_channel/55267", "content": "New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation\nhttps://www.securityweek.com/new-linux-kernel-vulnerability-fragnesia-allows-root-privilege-escalation/\n\nThe vulnerability, tracked as CVE-2026-46300, is similar to the recently disclosed exploits named Dirty Frag and Copy Fail.\nThe post New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation (https://www.securityweek.com/new-linux-kernel-vulnerability-fragnesia-allows-root-privilege-escalation/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2026-05-15T00:14:10.000000Z"}, {"uuid": "70c84045-a751-45e2-8e17-1904b74ecbce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mlxirzylgk24", "content": "Fragnesia (CVE-2026-46300) is a universal Linux local privilege escalation exploit", "creation_timestamp": "2026-05-16T09:09:33.150401Z"}, {"uuid": "8c8f9d23-c385-4842-972e-d59e2bccd1a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://fosstodon.org/users/alpinelinux/statuses/116584103491945357", "content": "New stable kernels landed today in Alpine Linux. They address the Fragnesia CVE (CVE-2026-46300), and the vulnerabilities that came before it.\n- 6.18.31- 6.12.89- 6.6.139- 5.15.207- 5.10.256\nThese have been backported all the way down to Alpine Linux 3.16.", "creation_timestamp": "2026-05-16T11:50:56.894134Z"}, {"uuid": "dcdd6d43-e382-46b8-90a2-cf94c72d4401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "published-proof-of-concept", "source": "Telegram/bDRsekGT6KsUOKSAQI-KSXDhypQzzgL-gjqbTcCXe2h_h6A", "content": "", "creation_timestamp": "2026-05-15T21:00:05.000000Z"}, {"uuid": "093ae713-de76-4bc8-9dd0-4930b0b94749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mlzcx6mem62h", "content": "Top 3 CVE for last 7 days:\nCVE-2026-42511: 56 interactions\nCVE-2026-46300: 56 interactions\nCVE-2026-42897: 51 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-45062: 11 interactions\nCVE-2020-17103: 8 interactions\nCVE-2026-46333: 5 interactions\n", "creation_timestamp": "2026-05-17T02:36:41.763247Z"}, {"uuid": "2a93a456-2cc1-4fb0-b348-7403fd90cb3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "published-proof-of-concept", "source": "Telegram/eJ_XuJ4mBNd-lwylDxspegor_v8Aby9HvlFsNuzO9g9tQUM", "content": "", "creation_timestamp": "2026-05-17T11:00:11.000000Z"}, {"uuid": "13ab2a01-2101-46b5-9e3e-69b1d254f5c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/technoholic.bsky.social/post/3mm3jehx2j42z", "content": "A new Linux kernel LPE bug, CVE-2026-46300 (CVSS 7.8), dubbed Fragnesia, enables local attackers to gain root. It's the third such bug in 2 weeks, linked to XFRM. Stay updated!", "creation_timestamp": "2026-05-17T23:30:30.648307Z"}, {"uuid": "b515f932-c2a2-4e3f-82c5-758de2b9e2ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mm3tgsl54a2v", "content": "Top 3 CVE for last 7 days:\nCVE-2026-46300: 56 interactions\nCVE-2026-42897: 54 interactions\nCVE-2026-31431: 43 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2025-55182: 18 interactions\nCVE-2026-31635: 5 interactions\nCVE-2025-53892: 4 interactions\n", "creation_timestamp": "2026-05-18T02:30:46.232764Z"}, {"uuid": "d01691b6-7d93-4dbc-a1b1-df7200c09ed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "Telegram/AKvzzPS6cRH5e3-Ghbw0kwesBlioL1QWpK2eWbvMSndUnWE", "content": "", "creation_timestamp": "2026-05-17T15:00:07.000000Z"}, {"uuid": "e401bbbc-454d-4c66-9e35-1cb3401b30b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3mm57w35ycnd2", "content": "Linux \u6838\u5fc3\u518d\u73fe\u672c\u6a5f\u6b0a\u9650\u63d0\u5347\u6f0f\u6d1e Fragnesia \u53ef\u5f71\u97ff\u9801\u9762\u5feb\u53d6\u5beb\u5165 \u7814\u7a76\u4eba\u54e1\u63ed\u9732Linux\u6838\u5fc3\u672c\u6a5f\u6b0a\u9650\u63d0\u5347\u6f0f\u6d1eFragnesia\uff0c\u7de8\u865fCVE-2026-46300\u3002\u8a72\u6f0f\u6d1e\u5b58\u5728\u65bcXFRM ESP...\n\n#\u65b0\u805e #\u8cc7\u8a0a\u5b89\u5168 #Copy #Fail #CVE-2026-46300 #Dirty #Frag #Fragnesia #LPE #Microsoft #page\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-18T15:47:16.638292Z"}, {"uuid": "ab0c3168-0081-4dfa-b8af-bd60033051db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/giggls.bsky.geggus.net/post/3mm4jz3usmnv2", "content": "Hm #Debian hat immer noch keinen #fragnesia fix.\nhttps://security-tracker.debian.org/tracker/CVE-2026-46300", "creation_timestamp": "2026-05-18T09:14:47.270186Z"}, {"uuid": "18f2f941-c2e9-422d-be15-7a614656dd43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/securityplus.bsky.social/post/3mm3xajrqrc2x", "content": "\ud328\uce58\ud558\uc790\ub9c8\uc790 \ub610 \ub6ab\ub838\ub2e4? \ub9ac\ub205\uc2a4 \ucee4\ub110 \ucd5c\uc2e0 \ubb34\ub825\ud654 \ucde8\uc57d\uc810 'Fragnesia(CVE-2026-46300)' \uc2e4\uc2b5 naver.me/FNt7cS36", "creation_timestamp": "2026-05-18T03:38:51.095037Z"}, {"uuid": "a1a18583-036a-4b28-90a1-23d317d74e29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mmaueesnqq2x", "content": "Top 3 CVE for last 7 days:\nCVE-2026-42897: 56 interactions\nCVE-2026-46300: 56 interactions\nCVE-2026-42945: 50 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31635: 9 interactions\nCVE-2026-42945: 8 interactions\nCVE-2026-41054: 4 interactions\n", "creation_timestamp": "2026-05-20T02:30:37.254513Z"}, {"uuid": "68b2f4f5-8c3f-4f19-a756-2288f038b17e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mmdetqhuk22x", "content": "Top 3 CVE for last 7 days:\nCVE-2026-45584: 64 interactions\nCVE-2026-42897: 56 interactions\nCVE-2026-46300: 46 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-45584: 64 interactions\nCVE-2026-46727: 21 interactions\nCVE-2026-42462: 11 interactions\n", "creation_timestamp": "2026-05-21T02:33:02.346713Z"}, {"uuid": "afec61da-decf-43b0-ae6c-1de86ca37d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/almalinux.org/post/3mmc5ftjz762o", "content": "ICYMI, Fragnesia (CVE-2026-46300) is a third recently disclosed Linux kernel local-root flaw.\n\nEvery supported AlmaLinux release is affected, so patched kernels have been rolled out to production repositories/mirrors.\n\nalmalinux.org/blog/2026-05...", "creation_timestamp": "2026-05-20T14:45:10.337796Z"}, {"uuid": "9cb71268-727f-4faa-94f6-09ea21e6ca10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://t.me/GithubRedTeam/85249", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026 #POC #Exploit\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a Fragnesia-go\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Koshmare-Blossom\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Go\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-21 15:53:57\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nA Go implementation of fragnesia (CVE-2026-46300)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-21T16:00:07.000000Z"}, {"uuid": "d2813fb2-33e7-4396-bdb7-94386d0d4281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "published-proof-of-concept", "source": "Telegram/LRuVHO_NRtLslMv_pxl3JYoJM5ygIHd_ktikilExPtpHxGM", "content": "", "creation_timestamp": "2026-05-20T15:00:07.000000Z"}, {"uuid": "d32b9e11-f473-4f99-bb17-885e1828afad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "published-proof-of-concept", "source": "Telegram/EUsL0GBkk0Vgc4QR4rSrAW23hhvDTc4r4ZLNoVXnBNt04Fk", "content": "", "creation_timestamp": "2026-05-20T19:00:11.000000Z"}, {"uuid": "624db24c-c697-40c2-8497-487ed38ae463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/giggls.bsky.geggus.net/post/3mmgfbhgh7bl2", "content": "#Debian still without a #fragnesia patch. Not funny anmore!\n(I know that there is a mitigation for systems without ipsec)\nhttps://security-tracker.debian.org/tracker/CVE-2026-46300", "creation_timestamp": "2026-05-22T07:16:39.340941Z"}, {"uuid": "d73ef5c5-6755-4042-a371-3d526af73c01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-46300", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116613462378951289", "content": "New.\nPicus: Fragnesia CVE-2026-46300: Linux Kernel LPE Vulnerability Explained https://www.picussecurity.com/resource/blog/fragnesia-cve-2026-46300-linux-kernel-lpe-vulnerability-explained #threatresearch #Linux #infosec #vulnerability", "creation_timestamp": "2026-05-21T16:17:04.932520Z"}, {"uuid": "3a619c0b-a80e-415e-b43d-eb50ea5c8722", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mmgyqvvbua2x", "content": "\ud83d\udd17 CVE : CVE-2025-21999, CVE-2025-38024, CVE-2025-71238, CVE-2026-23191, CVE-2026-23243, CVE-2026-23401, CVE-2026-31419, CVE-2026-31532, CVE-2026-43284, CVE-2026-46300, CVE-2026-46333", "creation_timestamp": "2026-05-22T13:05:12.408800Z"}, {"uuid": "a139df38-771a-435a-9ad8-3bc5e542008d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-46300", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mmgyr4kgoa2u", "content": "\ud83d\udd17 CVE : CVE-2025-54518, CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333", "creation_timestamp": "2026-05-22T13:05:18.559426Z"}]}