<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[And another...]]></title><description><![CDATA[<p>And another...</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.phoronix.com/news/Linux-Fragnesia" title="Fragnesia Made Public As Latest Linux Local Privilege Escalation Vulnerability">
<img src="https://www.phoronix.net/image.php?id=2026&amp;image=fragnesia" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.phoronix.com/news/Linux-Fragnesia">
Fragnesia Made Public As Latest Linux Local Privilege Escalation Vulnerability
</a>
</h5>
<p class="card-text line-clamp-3">Following last week's disclosure of the Dirty Frag vulnerability for the Linux kernel, which only finished being patched up in mainline on Monday, Fragnesia is now public as a similar local privilege escalation (LPE) vulnerability.</p>
</div>
<a href="https://www.phoronix.com/news/Linux-Fragnesia" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.phoronix.com/favicon-32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />





























<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.phoronix.com)</span></p>
</a>
</div><p></p><p><a href="https://mastodon.r3pek.org/tags/linux" rel="tag">#<span>linux</span></a> <a href="https://mastodon.r3pek.org/tags/lpe" rel="tag">#<span>lpe</span></a> <a href="https://mastodon.r3pek.org/tags/fragnesia" rel="tag">#<span>fragnesia</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/95422c17-08e6-4773-875c-80d1104e9f1a/and-another...</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:27:00 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/95422c17-08e6-4773-875c-80d1104e9f1a.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 19:27:42 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to And another... on Wed, 13 May 2026 19:40:03 GMT]]></title><description><![CDATA[<p><span><a href="/user/r3pek%40mastodon.r3pek.org" rel="nofollow noopener">@<span>r3pek</span></a></span> Right I understand that, but mitigations are applied faster than kernel patches, and luckily the mitigations <em>are</em> the same.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/mttaggart/statuses/116568962068760686</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/mttaggart/statuses/116568962068760686</guid><dc:creator><![CDATA[mttaggart@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 19:40:03 GMT</pubDate></item><item><title><![CDATA[Reply to And another... on Wed, 13 May 2026 19:35:12 GMT]]></title><description><![CDATA[<p><span><a href="/user/mttaggart%40infosec.exchange">@<span>mttaggart</span></a></span><br />&gt; This is a separate bug in the ESP/XFRM from dirtyfrag which has received its own patch.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/v12-security/pocs/tree/main/fragnesia" title="pocs/fragnesia at main · v12-security/pocs">
<img src="https://opengraph.githubassets.com/a0399d9dfe01c32a6d30eb15559521f22ba39898e4dc5284f26020e393bad61a/v12-security/pocs" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://github.com/v12-security/pocs/tree/main/fragnesia">
pocs/fragnesia at main · v12-security/pocs
</a>
</h5>
<p class="card-text line-clamp-3">poc it like it's hot. Contribute to v12-security/pocs development by creating an account on GitHub.</p>
</div>
<a href="https://github.com/v12-security/pocs/tree/main/fragnesia" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.r3pek.org/users/r3pek/statuses/116568942984753342</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.r3pek.org/users/r3pek/statuses/116568942984753342</guid><dc:creator><![CDATA[r3pek@mastodon.r3pek.org]]></dc:creator><pubDate>Wed, 13 May 2026 19:35:12 GMT</pubDate></item><item><title><![CDATA[Reply to And another... on Wed, 13 May 2026 19:33:13 GMT]]></title><description><![CDATA[<p><span><a href="/user/mttaggart%40infosec.exchange">@<span>mttaggart</span></a></span> but there's a new kernel patch <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f644.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--face_with_rolling_eyes" style="height:23px;width:auto;vertical-align:middle" title="🙄" alt="🙄" /></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.r3pek.org/users/r3pek/statuses/116568935231921544</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.r3pek.org/users/r3pek/statuses/116568935231921544</guid><dc:creator><![CDATA[r3pek@mastodon.r3pek.org]]></dc:creator><pubDate>Wed, 13 May 2026 19:33:13 GMT</pubDate></item><item><title><![CDATA[Reply to And another... on Wed, 13 May 2026 19:28:30 GMT]]></title><description><![CDATA[<p><span><a href="/user/r3pek%40mastodon.r3pek.org" rel="nofollow noopener">@<span>r3pek</span></a></span> Luckily this one is mitigated by the same fix as for DirtyFrag.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/mttaggart/statuses/116568916651316402</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/mttaggart/statuses/116568916651316402</guid><dc:creator><![CDATA[mttaggart@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 19:28:30 GMT</pubDate></item></channel></rss>