On Thu, May 14, 2026 at 06:07:44AM +0900, Hyunwoo Kim wrote: > Changes in v2: > - Also propagate SHARED_FRAG in skb_shift() > - v1: https://lore.kernel.org/all/agRfuVOeMI5pbHhY@v4bel/ Hi Hyunwoo, I've been working on mitigating this vulnerability as a member of the kernel team at CIQ, a distro vendor. In particular, we wanted to make sure that there weren't any lingering places missing SHARED_FRAG propagation. To that end, I used Claude to discover that skb_gro_receive() remained unpatched (as you pointed out in the v1 thread). And then I generated a PoC exploiting the vulnerable skb_gro_receive() path. The PoC is a modified version of the original fragnesia PoC. It works 100% of the time, just like the original fragnesia PoC. I have attached the PoC and a patch that fixes skb_gro_receive(). Please take a look at them. Thanks, Sultan