I also just verified it worked on my Arch install. But running the mitigation command and rebooting effectively blocked it, and I’m on the Arch LTS kernel. I think the disabled modules are related to IPSec, which most desktop users don’t really need.
Its a kernel exploit, so probably. But I just checked my arch installs,and I don’t have any of the kernel modules loaded. Loading requires root anyway, so I think this may be fairly limited in reality?
Well shit. I wonder if all Linux systems are affected, the testing in the repo doesn’t cover Arch for instance. For now I’d assume the answer is yes.
Yea it works on arch, I just tested on my own PC:
OS: Arch Linux x86_64 Kernel: Linux 7.0.3-arch1-2❯ ./exp [root@arch dirtyfrag]# ls README.md assets exp exp.c [root@arch dirtyfrag]# whoami rootI updated it last week.
Edit: I just ran
yay -Suyto update everything and still works.Have you tried updating your system with a less cheerful command? Like
damn -SyuI also just verified it worked on my Arch install. But running the mitigation command and rebooting effectively blocked it, and I’m on the Arch LTS kernel. I think the disabled modules are related to IPSec, which most desktop users don’t really need.
Did you have the modules loaded before running the exploit?
I did. No idea how or why, though.
Its a kernel exploit, so probably. But I just checked my arch installs,and I don’t have any of the kernel modules loaded. Loading requires root anyway, so I think this may be fairly limited in reality?
They’ll get loaded, even without root
don’t see 'em loaded here, either. trixie (dietpi) server, aurora (f44) desktop