This commit is contained in:
develop4God 2026-05-10 23:10:00 +05:30 committed by GitHub
commit e59811b8b1
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -55,8 +55,11 @@ This Dirty Frag has been tested on the following distribution versions.
- CentOS Stream 10: 6.12.0-224.el10.x86_64 - CentOS Stream 10: 6.12.0-224.el10.x86_64
- AlmaLinux 10: 6.12.0-124.52.3.el10_1.x86_64 - AlmaLinux 10: 6.12.0-124.52.3.el10_1.x86_64
- Fedora 44: 6.19.14-300.fc44.x86_64 - Fedora 44: 6.19.14-300.fc44.x86_64
- Pop!_OS 24.04 LTS: 6.18.7-76061807-generic
- ... - ...
> **Pop!_OS note:** System76 applied mitigation via kernel update on 2026-05-08. Modules `esp4`, `esp6`, and `rxrpc` blacklisted via `/etc/modprobe.d/pop-default-settings-dirty-frag.conf`. `rxrpc` patch still pending upstream; `esp4`/`esp6` patched but kept disabled. See: https://system76.com/blog/post/linux-zero-day-dirty-frag-and-copy-fail-vulnerability-fixes-released
# Mitigation # Mitigation
1. Use the following command to remove the modules in which the vulnerabilities occur and clear the page cache. 1. Use the following command to remove the modules in which the vulnerabilities occur and clear the page cache.