• the_weez@midwest.social
    link
    fedilink
    arrow-up
    6
    ·
    15 hours ago

    Well shit. I wonder if all Linux systems are affected, the testing in the repo doesn’t cover Arch for instance. For now I’d assume the answer is yes.

    • Remus86@lemmy.zip
      link
      fedilink
      arrow-up
      6
      ·
      14 hours ago

      I also just verified it worked on my Arch install. But running the mitigation command and rebooting effectively blocked it, and I’m on the Arch LTS kernel. I think the disabled modules are related to IPSec, which most desktop users don’t really need.

    • CodenameDarlen@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      edit-2
      15 hours ago

      Yea it works on arch, I just tested on my own PC:

      OS: Arch Linux x86_64
      Kernel: Linux 7.0.3-arch1-2
      
      ❯ ./exp
      [root@arch dirtyfrag]# ls
      README.md  assets  exp  exp.c
      [root@arch dirtyfrag]# whoami
      root
      

      I updated it last week.

      Edit: I just ran yay -Suy to update everything and still works.

    • CameronDev@programming.dev
      link
      fedilink
      arrow-up
      6
      ·
      15 hours ago

      Its a kernel exploit, so probably. But I just checked my arch installs,and I don’t have any of the kernel modules loaded. Loading requires root anyway, so I think this may be fairly limited in reality?

      • adarza@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        13 hours ago

        don’t see 'em loaded here, either. trixie (dietpi) server, aurora (f44) desktop