<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let&#x27;s test #DirtyFrag on #Slackware 15!]]></title><description><![CDATA[<p>So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let's test <a href="https://mastodon.sdf.org/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a> on <a href="https://mastodon.sdf.org/tags/Slackware" rel="tag">#<span>Slackware</span></a> 15!</p><p>"The target is /usr/bin/su" - oh bless your soul, you naughty little hacker you...</p><p>🧵</p>]]></description><link>https://board.circlewithadot.net/topic/5abb42d1-ee60-440d-85db-25a6a94f9223/so-the-night-is-still-young-and-i-need-distraction-from-megacorp-b.s.-so-there-goes-nothing-let-s-test-dirtyfrag-on-slackware-15</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:12:57 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/5abb42d1-ee60-440d-85db-25a6a94f9223.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 07 May 2026 21:35:29 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let&#x27;s test #DirtyFrag on #Slackware 15! on Fri, 08 May 2026 07:46:56 GMT]]></title><description><![CDATA[<p><span><a href="/user/paradegrotesque%40mastodon.sdf.org">@<span>ParadeGrotesque</span></a></span> Noticed the same when I checked earlier, wasn't sure if the default 'huge' kernel was vulnerable, but, the (patched) generic kernel w/ my initrd was also fine (even ignoring the /usr/bin/su vs /bin/su difference)<br />... so, much like with copyfail, I'm left wondering why these modules are loaded by default on so many systems in the first place, since nothing seems to be breaking without them.</p>]]></description><link>https://board.circlewithadot.net/post/https://girlcock.club/users/miss_rodent/statuses/116537846456912556</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://girlcock.club/users/miss_rodent/statuses/116537846456912556</guid><dc:creator><![CDATA[miss_rodent@girlcock.club]]></dc:creator><pubDate>Fri, 08 May 2026 07:46:56 GMT</pubDate></item><item><title><![CDATA[Reply to So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let&#x27;s test #DirtyFrag on #Slackware 15! on Thu, 07 May 2026 22:12:44 GMT]]></title><description><![CDATA[<p>Once again, like <a href="https://mastodon.sdf.org/tags/CopyFail" rel="tag">#<span>CopyFail</span></a> <a href="https://mastodon.sdf.org/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a> seems overhyped.</p><p>Also: running the bleeding edge kernel and distro will get you a nasty bite in the butt.  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f913.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--nerd_face" style="height:23px;width:auto;vertical-align:middle" title="🤓" alt="🤓" /></p><p>I expect <a href="https://mastodon.sdf.org/tags/Slackware" rel="tag">#<span>Slackware</span></a> to release a new kernel soon to patch <a href="https://mastodon.sdf.org/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535588614839988</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535588614839988</guid><dc:creator><![CDATA[paradegrotesque@mastodon.sdf.org]]></dc:creator><pubDate>Thu, 07 May 2026 22:12:44 GMT</pubDate></item><item><title><![CDATA[Reply to So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let&#x27;s test #DirtyFrag on #Slackware 15! on Thu, 07 May 2026 22:09:24 GMT]]></title><description><![CDATA[<p>Conclusion: <a href="https://mastodon.sdf.org/tags/slackware" rel="tag">#<span>slackware</span></a> 15 in its base version does not seem to be affected by <a href="https://mastodon.sdf.org/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a> provided you have applied all the patches.</p><p>Make of that what you will, I am not an expert.</p><p>🧵</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535575503062065</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535575503062065</guid><dc:creator><![CDATA[paradegrotesque@mastodon.sdf.org]]></dc:creator><pubDate>Thu, 07 May 2026 22:09:24 GMT</pubDate></item><item><title><![CDATA[Reply to So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let&#x27;s test #DirtyFrag on #Slackware 15! on Thu, 07 May 2026 22:06:52 GMT]]></title><description><![CDATA[<p>Well, the only mitigation published indicates this:</p><p>sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' &gt; /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2&gt;/dev/null; true"</p><p>So, do not load modules esp4, esp6 and rxrpc, which on my Slackware machine is...</p><p>$ /sbin/lsmod | grep -i ^esp<br />esp4                   28672  0</p><p>$ /sbin/lsmod | grep -i ^rxrpc<br />rxrpc                 290816  0</p><p>$ uname -rms<br />Linux 5.15.204 x86_64</p><p>So, no esp6 kernel module.</p><p>🧵</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535565504936784</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535565504936784</guid><dc:creator><![CDATA[paradegrotesque@mastodon.sdf.org]]></dc:creator><pubDate>Thu, 07 May 2026 22:06:52 GMT</pubDate></item><item><title><![CDATA[Reply to So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let&#x27;s test #DirtyFrag on #Slackware 15! on Thu, 07 May 2026 21:59:02 GMT]]></title><description><![CDATA[<p>Well, that went about as well as you could expect:</p><p>$ git clone <a href="https://github.com/V4bel/dirtyfrag.git" rel="nofollow noopener noreferrer"><span>https://</span><span>github.com/V4bel/dirtyfrag.git</span><span></span></a></p><p>$ gcc -O0 -Wall -o exp exp.c -lutil</p><p>$ ./exp<br />dirtyfrag: failed (rc=3)</p><p>Mind you, this after editing the 'exp.c' file to replace all occurences of /usr/bin/su to /bin/su</p><p>I suspect Slackware 15 and its kernel modules do not contain the vulnerable ones that <a href="https://mastodon.sdf.org/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a> is targeting.</p><p>🧵</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535534683868722</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.sdf.org/users/ParadeGrotesque/statuses/116535534683868722</guid><dc:creator><![CDATA[paradegrotesque@mastodon.sdf.org]]></dc:creator><pubDate>Thu, 07 May 2026 21:59:02 GMT</pubDate></item></channel></rss>