If Rocky Linux is affected by this CVE-2026-46300
POC: pocs/fragnesia/README.md at main · v12-security/pocs · GitHub
If Rocky Linux is affected by this CVE-2026-46300
POC: pocs/fragnesia/README.md at main · v12-security/pocs · GitHub
If the github link is accurate, then this vulnerability would affect Rocky Linux (because Rocky was vulnerable to DirtyFrag).
Rocky has patched kernels available in the new security repo; run dnf update to get the latest repo definitions, then dnf --enablerepo=security update to get the patched kernel, then reboot to run the patched kernel.
Also according to the link, the mitigation is the same as for DirtyFrag – useful if you can’t reboot immediately.
Edit: It doesn’t necessarily follow that Rocky’s DirtyFrag patch fixes this one. After further reading, I’m guessing it doesn’t.
I’ve just attempted this on Rocky 8.10 with the latest kernel installed from the new security repo and has given me root access
Yep, it requires an additional fix, so all versions are affected. There’s already a RHEL page for this that shows what is affected. I guess a fix will appear in the next couple of days.
The kernel patch is different: net: skbuff: preserve shared-frag marker during coalescing
So it requires an additional fix as @iwalker said.