From 42f93f3c871e0db09af2d973427a34b7649a1e5a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=80=9Cljm42=E2=80=9D?= <“larry_meaney@iname.com”> Date: Wed, 13 May 2026 11:49:43 -0700 Subject: [PATCH] Update 7.3.0 security note --- docs/unraid-os/release-notes/7.3.0.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/unraid-os/release-notes/7.3.0.md b/docs/unraid-os/release-notes/7.3.0.md index 9eeee39cf6..b7535f1317 100644 --- a/docs/unraid-os/release-notes/7.3.0.md +++ b/docs/unraid-os/release-notes/7.3.0.md @@ -41,7 +41,7 @@ If you are considering any rollback path below `7.3.0`, also see the [7.2.6 rele - Security: Add WebGUI security hardening for authenticated-session request handling. This fix is already included in 7.2.5. - Security: Update packages -- Security note: The included 7.3 kernel contains the fix for CVE-2026-31431, the Copy Fail local privilege escalation vulnerability as well as CVE-2025-43284 Dirty Frag local privilege escalation vulnerability. +- Security note: The included 7.3 kernel patches two local privilege escalation vulnerabilities: Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284 and CVE-2026-43500) ### Onboarding and internal boot