Ok this is the first time I try one of these exploits and it works on my system, I’m currently very spooked.
On the other hand, this may allow me to root my LG WebOS TV?
Now that i Didn’t consider
Can’t wait for one that’ll work on Android so I can maybe root some otherwise useless old phones
What would you use the old phones for out of curiosity?
A middle finger to those you’re jailbreaking from.
Good to see these exploits being found and worked on
This was leaked early. There is a mitigation (see link for confirmation):
sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"
What’s up with all these vulnerabilities?
Kind of worried to be honest, two in like a week? Pretty scary.
I’m very dumb about Linux technical stuff but I feel like root access is way too easy to be accessed.
Is there any way to make it harder? I mean let’s say similar to Android, you need to unlock the boot loader first, flash a recovery and flash Magisk or something, that’s a good layer before root access.
At least for Linux Desktop, maybe make it so we can get root access only via a bootable USB with a correct password? Just for sporadic system changes.
Is there anything like that?
It’s a positive thing, don’t be worried.
These vulns already existed. It’s possible the bad guys were already using them. This gets them out in the open and on their way to being resolved.
Just keep patches up to date with any modern and maintained distro and you’ll be grand.
With AI enabled bug hunting, you’re likely to see a blitz of vulnerabilities, followed by a significant reduction in vulnerabilities.
Yes, malicious folks are usin em – heck, Kali’s had AI integrations for a while on a bunch of its tools even, for pen testing. But devs writing code get em too, and those are the people we need to see using these sorts of workflows as it lets them clip a bunch of zero days.
I think Mozilla, as an example, had a recent patch that cleaned up something like 271 zero days? Anthropic taking their Mythos stuff to banks/govt was largely just a publicity thing to try and shut people up who were mocking claudes code, but also potentially because it’d found govt-placed backdoors that they wanted the gov to know were about to be exposed / patched. The USA’s alleged ability to “shut off” tech assets during raids in Venezuela and Iran, gets trickier if AI is exposing their back doors. Likely also why the US Administration is now saying they want to review AIs before they get released. Mythos definitely isn’t the only game in town for this sort of stuff – but the general idea that the dev teams will be shifting to using these tools for QA / writing more secure apps in the near future, is fairly valid. So I wouldn’t go too tinfoil hat-y on that front… though it is a period where we’ll see a need to patch aggressively, and to double check security configs etc.
This exploit appears to be inspired by the copy fail.
Should you be worried? Nah, You should not be installing untrusted software on your device. This isnt even the type of exploit that scares me. Your device gas to already be compromised for this exploit to succeed.
Supply chain attacks are what scare me.
Supply chain attacks are what scare me.
As a former OS security pro, this is the right answer. Not because of the exploit itself, but because young (unmentored) coders readily trust some really bad patterns of pulling in random junk from the web and running it. THIS is how the LPE becomes essentially an RCE-level problem.
Does this affect immutable distros like Bazzite?
I’m pretty sure it does; as secureblue, an
immutableatomic distro that’s hardened by default, required this commit to mitigate it once and for all.While Bazzite and its atomic brethren do provide some additional protection against attacks, it’s often very overstated 😅. Hence, it’s unsurprising that it doesn’t provide any defense against this assault.
We’re living through the Linux’ enshittification era
How is finding vulnerabilities and patching them enshittification?
I feel like you don’t even know what enshittification is.
Not sure the term applies here. Enshittification is about companies making products worse on purpose for profit.
See who’s behind the Linux Foundation
No?
Not really. Proprietary software have just as many if not more vulnerabilities. Linux is just more honest and open about reporting them so it seems like they have more.
Linux also shows up more in CVE databases etc because many distributions also assign their own CVEs for the same bugs.
The vulnerability has been there for years so if it’s enshittified it has been for years as well.
Well shit. I wonder if all Linux systems are affected, the testing in the repo doesn’t cover Arch for instance. For now I’d assume the answer is yes.
I also just verified it worked on my Arch install. But running the mitigation command and rebooting effectively blocked it, and I’m on the Arch LTS kernel. I think the disabled modules are related to IPSec, which most desktop users don’t really need.








