From 7f0f3a1390fb9946408f08e80818c0816bf2a8eb Mon Sep 17 00:00:00 2001 From: V4bel Date: Fri, 8 May 2026 18:10:42 +0900 Subject: [PATCH] CVE --- README.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/README.md b/README.md index cb94cd5..e447c78 100644 --- a/README.md +++ b/README.md @@ -16,6 +16,11 @@ For detailed technical information and the timeline, [see here](assets/write-up. Because the embargo has currently been broken, no patch or CVE exists. After consultation with the maintainers on linux-distros@vs.openwall.org and at their request, this Dirty Frag document is being published. For the disclosure timeline, refer to the technical details. +> [!NOTE] +> **2026-05-08 Update:** +> - The `xfrm-ESP Page-Cache Write` vulnerability has been assigned `CVE-2026-43284` and patched in mainline at [f4c50a4034e6](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4). +> - The `RxRPC Page-Cache Write` vulnerability has been reserved as `CVE-2026-43500` for tracking; no patch exists in any tree yet. + # Exploiting ## One-line special