arm64/aarch64 port of V4bel/dirtyfrag (CVE-2026-43284). ESP-only - rxrpc path kernel-oopses on arm64 due to flush_dcache_page
-
Updated
May 13, 2026 - C
arm64/aarch64 port of V4bel/dirtyfrag (CVE-2026-43284). ESP-only - rxrpc path kernel-oopses on arm64 due to flush_dcache_page
Read-only checker for CVE-2026-43284 / CVE-2026-43500 (Dirty Frag) Linux kernel local-root vulns
Runtime integrity guard: detect and block Linux page cache tampering (Copy Fail, Dirty Pipe, Dirty Frag) via O_DIRECT + fanotify. Includes 7 host-side exploitation PoCs.
Wazuh 4.14.4 detection rules for CVE-2026-43284 / CVE-2026-43500 (Dirty Frag) - Linux Local Privilege Escalation via page cache write
Dirty Frag (CVE-2026-43284/43500) - Linux Kernel LPE Deep Technical Analysis by Bomb
CVE-2026-46300 / CVE-2026-43500 / CVE-2026-31431 / CVE-2026-43284 golang hotfix
CVE-2026-43500 / CVE-2026-31431 / CVE-2026-43284 golang hotfix
Add a description, image, and links to the cve-2026-43500 topic page so that developers can more easily learn about it.
To associate your repository with the cve-2026-43500 topic, visit your repo's landing page and select "manage topics."