
Three page-cache privilege escalation vulnerabilities in three weeks. Copy Fail, Dirty Frag, Fragnesia. The pattern is clear.
CIQ's response to Fragnesia was different. Instead of patching what researchers found and moving on, Sultan Alsawaf audited the kernel's networking stack for additional vulnerable code paths and found one. He built a proof-of-concept, confirmed it worked, and posted both the exploit and the fix to the Linux kernel mailing list the same day. The upstream maintainer folded it into the V3 patch within hours.
Nathan Blackham covers the full story: what Fragnesia is, how CIQ found a path the original researchers missed, and what proactive kernel security actually looks like in practice.
Read it here: bit.ly/3R2jkQB
#LinuxSecurity #EnterpriseLinux #RockyLinux #CVE #CIQ #LinuxKernel
English














