>"Quick - copy and paste all your comments from the "Copy Fail" discussion over here!"
Pretty much :) It is essentially the same issue, found in three other kernel modules. Alma Linux and others already have pages up about it. These are serious issues for multiuser/multitenant servers needing to mitigate immediately. Not so much for single-user or home systems.
Copy Fail used the algif_aead module and for enterprise Linuxes, that is built-into the kernel. So either update the kernel, or mitigate with:
# grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"
and reboot. Dirty Frag uses three additional modules: esp4, esp6, and rxrpc. Enterprise Linuxes don't build those in, so all distros should be able to use something like:
# rmmod esp4 esp6 rxrpc
# sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf"
for immediate mitigation, without rebooting. Of course, disabling those modules has a price, it will disable IPsec ESP, IPsec VPNs (like Swan), and AFS clients. So if you use/need those, you can't mitigate without losing that functionality.