Dirty Frag vulnerability fix is ready for testing

The AnnouncementA week after Copy Fail, researcher Hyunwoo Kim disclosed a second Linux kernel flaw in the same broad area — IPsec ESP and rxrpc — that they have named Dirty Frag. The bug lives in the in-place decryption fast paths of esp4, esp6, and rxrpc: when a socket buffer carries paged fragments that are not privately owned by the kernel (e.g. pipe pages attached via splice(2)/sendfile(2)/MSG_SPLICE_PAGES), the receive path decrypts directly over those externally-backed pages, exposing or corrupting plaintext that an unprivileged process still holds a reference to.

AlmaLinux OS

@jschauma

It looks like patched kernels for Debian stable (Trixie) are on the servers.

No Changelogs though, a fairly sure sign of an active critical vulnerability.