{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreia5rdxwemjkvltu5bq6ca6fshruobm3wpzb2tajrhrzscxtfqql2q",
    "uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mm2grdsme652"
  },
  "path": "/t/dirty-frag-sequel-continues-the-streak-of-linux-kernel-privilege-escalation-vulnerabilities/37973#post_1",
  "publishedAt": "2026-05-17T12:29:14.000Z",
  "site": "https://discuss.privacyguides.net",
  "tags": [
    "Fragnesia",
    "Dirty Frag",
    "https://www.privacyguides.org/news/2026/05/17/dirty-frag-sequel-continues-the-streak-of-linux-kernel-privilege-escalation-vulnerabilities"
  ],
  "textContent": "Fragnesia, the latest local privilege escalation vulnerability in the same family as Dirty Frag, emerges as an “unintended side effect of one of the patches addressing the original Dirty Frag vulnerabilities” according to the original creator of Dirty Frag, Hyunwood Kim.\n\n* * *\n\nThis is a companion discussion topic for the original entry at https://www.privacyguides.org/news/2026/05/17/dirty-frag-sequel-continues-the-streak-of-linux-kernel-privilege-escalation-vulnerabilities",
  "title": "Dirty Frag Sequel Continues the Streak of Linux Kernel Privilege Escalation Vulnerabilities"
}