<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(wiz.io) Fragnesia: New DirtyFrag Variant Exploits Linux Kernel XFRM ESP-in-TCP for Local Privilege Escalation]]></title><description><![CDATA[<p>(wiz.io) Fragnesia: New DirtyFrag Variant Exploits Linux Kernel XFRM ESP-in-TCP for Local Privilege Escalation</p><p>New DirtyFrag variant *Fragnesia* exploits Linux kernel XFRM ESP-in-TCP (CVE pending) for local privilege escalation via page cache corruption. Unprivileged attackers can overwrite read-only files (e.g., /usr/bin/su) to gain root without disk modification.</p><p>In brief - A logic flaw in Linux kernel's XFRM ESP-in-TCP handling enables unprivileged local attackers to corrupt page cache contents and escalate privileges. Exploits AES-GCM keystream manipulation; partial mitigations exist but patching is critical.</p><p>Technically - Fragnesia abuses skb coalescing in the XFRM ESP-in-TCP subsystem by splicing file-backed pages into a TCP receive queue before ESP processing. Attackers use CAP_NET_ADMIN (via user/network namespaces), NETLINK_XFRM to install crafted ESP SAs, and trigger in-place decryption to corrupt cached file pages. Demonstrated by overwriting /usr/bin/su with an ELF payload executing setresuid(0,0,0). AppArmor restrictions on unprivileged user namespaces may mitigate, but kernel patches are required.</p><p>Source: <a href="https://www.wiz.io/blog/fragnesia-linux-kernel-local-privilege-escalation-via-esp-in-tcp" rel="nofollow noopener"><span>https://www.</span><span>wiz.io/blog/fragnesia-linux-ke</span><span>rnel-local-privilege-escalation-via-esp-in-tcp</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/c3f4ae3a-2f0b-4d96-ae76-1b3d5abe4938/wiz.io-fragnesia-new-dirtyfrag-variant-exploits-linux-kernel-xfrm-esp-in-tcp-for-local-privilege-escalation</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 05:35:12 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/c3f4ae3a-2f0b-4d96-ae76-1b3d5abe4938.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 13:56:00 GMT</pubDate><ttl>60</ttl></channel></rss>