• the_weez@midwest.social
    link
    fedilink
    arrow-up
    7
    ·
    21 hours ago

    Well shit. I wonder if all Linux systems are affected, the testing in the repo doesn’t cover Arch for instance. For now I’d assume the answer is yes.

    • CodenameDarlen@lemmy.world
      link
      fedilink
      arrow-up
      10
      ·
      edit-2
      21 hours ago

      Yea it works on arch, I just tested on my own PC:

      OS: Arch Linux x86_64
      Kernel: Linux 7.0.3-arch1-2
      
      ❯ ./exp
      [root@arch dirtyfrag]# ls
      README.md  assets  exp  exp.c
      [root@arch dirtyfrag]# whoami
      root
      

      I updated it last week.

      Edit: I just ran yay -Suy to update everything and still works.

      • racoon@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        2 hours ago

        Have you tried updating your system with a less cheerful command? Like damn -Syu

    • Remus86@lemmy.zip
      link
      fedilink
      arrow-up
      7
      ·
      20 hours ago

      I also just verified it worked on my Arch install. But running the mitigation command and rebooting effectively blocked it, and I’m on the Arch LTS kernel. I think the disabled modules are related to IPSec, which most desktop users don’t really need.

    • CameronDev@programming.dev
      link
      fedilink
      arrow-up
      6
      ·
      21 hours ago

      Its a kernel exploit, so probably. But I just checked my arch installs,and I don’t have any of the kernel modules loaded. Loading requires root anyway, so I think this may be fairly limited in reality?