Follow @Openwall on Twitter for new release announcements and other news
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2026050820-unabashed-viral-ef9d@gregkh>
Date: Fri, 8 May 2026 10:56:23 +0200
From: Greg KH <greg@...ah.com>
To: Sandipan Roy <saroy@...hat.com>
Cc: oss-security@...ts.openwall.com, cve@...nel.org, imv4bel@...il.com
Subject: Re: Dirty Frag: Universal Linux LPE

On Fri, May 08, 2026 at 09:24:01AM +0200, Greg KH wrote:
> On Fri, May 08, 2026 at 12:43:59AM +0530, Sandipan Roy wrote:
> > Hi,
> > 
> > This stated that “no patches or CVEs exist” because the embargo was broken.
> > Could you please provide an update on the CVE assignment status for this
> > issue?
> 
> CVE-2026-43284 is now assigned.

That was for the first issue, and that is now fixed in the latest round
of stable kernel updates.  The second has CVE-2026-43500 reserved for it
if you need to track this, and is not fixed in any released kernel
version yet.

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.