This commit is contained in:
develop4God 2026-05-10 23:10:00 +05:30 committed by GitHub
commit e59811b8b1
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -55,8 +55,11 @@ This Dirty Frag has been tested on the following distribution versions.
- CentOS Stream 10: 6.12.0-224.el10.x86_64
- AlmaLinux 10: 6.12.0-124.52.3.el10_1.x86_64
- Fedora 44: 6.19.14-300.fc44.x86_64
- Pop!_OS 24.04 LTS: 6.18.7-76061807-generic
- ...
> **Pop!_OS note:** System76 applied mitigation via kernel update on 2026-05-08. Modules `esp4`, `esp6`, and `rxrpc` blacklisted via `/etc/modprobe.d/pop-default-settings-dirty-frag.conf`. `rxrpc` patch still pending upstream; `esp4`/`esp6` patched but kept disabled. See: https://system76.com/blog/post/linux-zero-day-dirty-frag-and-copy-fail-vulnerability-fixes-released
# Mitigation
1. Use the following command to remove the modules in which the vulnerabilities occur and clear the page cache.