For machines that cannot be rebooted, this program can be used to check and mitigate the vulnerabilities.
go build -o dirtypatch cmd/main.go
# since this is a patch, not a exploit, root permission is required
sudo ./dirtypatchIt checks the vulnerabilities and try to mitigate them.
- copyfail:
- LKM: it disables the module algif_aead and clears the page cache.
- builtin: it uses systemtap to patch the kernel.
- dirtyfrag:
- it disables the modules esp4, esp6, rxrpc and clears the page cache.
- builtin not supported yet
- CVE-2026-31431 "copy fail"
- "dirty frag"
MIT License Copyright (c) 2026 Yun Dou
See LICENSE for details.