<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I&#x27;m not super familiar with Red Hat, but can someone do a sanity check for me?]]></title><description><![CDATA[<p>I'm not super familiar with Red Hat, but can someone do a sanity check for me? The recommended mitigation for DirtyFrag is to add the relevant modules to a modprobe blocklist. But...I wasn't aware the modules were loaded dynamically? At least on Fedora, they were not.</p><p>I very much want to be wrong about this. And expect I am, but want to be sure.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://access.redhat.com/security/vulnerabilities/RHSB-2026-003" title="RHSB-2026-003 Networking subsystem Privilege Escalation - Linux Kernel (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300) - Dirty Frag | Red Hat Customer Portal">
<img src="https://access.redhat.com/chrome_themes/nimbus/img/red-hat-customer-portal.svg" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>





<div class="card-body">
<h5 class="card-title">
<a href="https://access.redhat.com/security/vulnerabilities/RHSB-2026-003">
RHSB-2026-003 Networking subsystem Privilege Escalation - Linux Kernel (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300) - Dirty Frag | Red Hat Customer Portal
</a>
</h5>
<p class="card-text line-clamp-3">Access Red Hat’s knowledge, guidance, and support through your subscription.</p>
</div>
<a href="https://access.redhat.com/security/vulnerabilities/RHSB-2026-003" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://access.redhat.com/themes/custom/dxp_security_theme/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">Red Hat Customer Portal <span class="text-secondary">(access.redhat.com)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/topic/b9aa3242-4158-4398-b8ac-8d42f7a30693/i-m-not-super-familiar-with-red-hat-but-can-someone-do-a-sanity-check-for-me</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 00:37:38 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/b9aa3242-4158-4398-b8ac-8d42f7a30693.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 09 May 2026 02:30:21 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to I&#x27;m not super familiar with Red Hat, but can someone do a sanity check for me? on Sat, 09 May 2026 02:46:37 GMT]]></title><description><![CDATA[<p><span><a href="/user/mttaggart%40infosec.exchange">@<span>mttaggart</span></a></span> <br />The Red Hat mitigation works fine for protecting both Red Hat and Fedora.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/542/325/474/837/036/original/2ae865b9884a6a65.png" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/542/325/478/626/900/original/364aacfe14994515.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116542327855832491</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116542327855832491</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Sat, 09 May 2026 02:46:37 GMT</pubDate></item></channel></rss>