Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <af2JlX2oIJnlmCJa@client.brlink.eu>
Date: Fri, 8 May 2026 08:58:29 +0200
From: "Bernhard R. Link" <brl+oss@...l.brlink.eu>
To: oss-security@...ts.openwall.com
Subject: Re: Dirty Frag: Universal Linux LPE

* Hyunwoo Kim <imv4bel@...il.com> [260507 21:02]:
> no patches exist for any distribution. Use the following command to remove the
> modules in which the vulnerabilities occur:
G ```
> sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"
> ```

It really starts to feel like there should be a design CVE for not
having an only-appendable-by-root allowlist of modules to autoload...

sigh...

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.