Ship vendor kernels fast; defer risky module hacks unless approved.
Mechanisms, commits, and researcher FAQs—without exploit steps.
CVE-specific kernelspeak stays on dedicated pages; synthesis ( chains, Copy Fail lineage, maintainer commits ) lives on Technical.
Proof-of-concept source is referenced only through github.com/V4bel/dirtyfrag for authorized environments.
Immutable references for filings and ticket citations.
Detailed wording remains on each CVE page and NVD; refresh after enrichment updates.
| Field | CVE-2026-43284 | CVE-2026-43500 |
|---|---|---|
| Subsystem | xfrm ESP input / UDP splice skb fragments | RxRPC DATA / RESPONSE handlers |
| CWE (NVD) | CWE-123 (per CISA-ADP listing) | CWE-787 |
| CVSS 3.1 (publishers) | CNA kernel.org 8.8 HIGH vs CISA-ADP 7.8 HIGH — verify on NVD | NIST / CISA-ADP 7.8 HIGH — verify on NVD |
| Kernel scope | Independent CPE ranges per CVE—never merge audits blindly. | |
rxrpc.ko ships or loads—pairing variants improves coverage across maintained distros. Full narrative on Technical.