Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let's test #DirtyFrag on #Slackware 15!

So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let's test #DirtyFrag on #Slackware 15!

Scheduled Pinned Locked Moved Uncategorized
dirtyfragslackware
6 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
    paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
    paradegrotesque@mastodon.sdf.org
    wrote last edited by
    #1

    So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let's test #DirtyFrag on #Slackware 15!

    "The target is /usr/bin/su" - oh bless your soul, you naughty little hacker you...

    🧡

    paradegrotesque@mastodon.sdf.orgP 1 Reply Last reply
    0
    • paradegrotesque@mastodon.sdf.orgP paradegrotesque@mastodon.sdf.org

      So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let's test #DirtyFrag on #Slackware 15!

      "The target is /usr/bin/su" - oh bless your soul, you naughty little hacker you...

      🧡

      paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
      paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
      paradegrotesque@mastodon.sdf.org
      wrote last edited by
      #2

      Well, that went about as well as you could expect:

      $ git clone https://github.com/V4bel/dirtyfrag.git

      $ gcc -O0 -Wall -o exp exp.c -lutil

      $ ./exp
      dirtyfrag: failed (rc=3)

      Mind you, this after editing the 'exp.c' file to replace all occurences of /usr/bin/su to /bin/su

      I suspect Slackware 15 and its kernel modules do not contain the vulnerable ones that #DirtyFrag is targeting.

      🧡

      paradegrotesque@mastodon.sdf.orgP 1 Reply Last reply
      0
      • paradegrotesque@mastodon.sdf.orgP paradegrotesque@mastodon.sdf.org

        Well, that went about as well as you could expect:

        $ git clone https://github.com/V4bel/dirtyfrag.git

        $ gcc -O0 -Wall -o exp exp.c -lutil

        $ ./exp
        dirtyfrag: failed (rc=3)

        Mind you, this after editing the 'exp.c' file to replace all occurences of /usr/bin/su to /bin/su

        I suspect Slackware 15 and its kernel modules do not contain the vulnerable ones that #DirtyFrag is targeting.

        🧡

        paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
        paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
        paradegrotesque@mastodon.sdf.org
        wrote last edited by
        #3

        Well, the only mitigation published indicates this:

        sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

        So, do not load modules esp4, esp6 and rxrpc, which on my Slackware machine is...

        $ /sbin/lsmod | grep -i ^esp
        esp4 28672 0

        $ /sbin/lsmod | grep -i ^rxrpc
        rxrpc 290816 0

        $ uname -rms
        Linux 5.15.204 x86_64

        So, no esp6 kernel module.

        🧡

        paradegrotesque@mastodon.sdf.orgP 1 Reply Last reply
        0
        • paradegrotesque@mastodon.sdf.orgP paradegrotesque@mastodon.sdf.org

          Well, the only mitigation published indicates this:

          sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

          So, do not load modules esp4, esp6 and rxrpc, which on my Slackware machine is...

          $ /sbin/lsmod | grep -i ^esp
          esp4 28672 0

          $ /sbin/lsmod | grep -i ^rxrpc
          rxrpc 290816 0

          $ uname -rms
          Linux 5.15.204 x86_64

          So, no esp6 kernel module.

          🧡

          paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
          paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
          paradegrotesque@mastodon.sdf.org
          wrote last edited by
          #4

          Conclusion: #slackware 15 in its base version does not seem to be affected by #DirtyFrag provided you have applied all the patches.

          Make of that what you will, I am not an expert.

          🧡

          paradegrotesque@mastodon.sdf.orgP 1 Reply Last reply
          0
          • paradegrotesque@mastodon.sdf.orgP paradegrotesque@mastodon.sdf.org

            Conclusion: #slackware 15 in its base version does not seem to be affected by #DirtyFrag provided you have applied all the patches.

            Make of that what you will, I am not an expert.

            🧡

            paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
            paradegrotesque@mastodon.sdf.orgP This user is from outside of this forum
            paradegrotesque@mastodon.sdf.org
            wrote last edited by
            #5

            Once again, like #CopyFail #DirtyFrag seems overhyped.

            Also: running the bleeding edge kernel and distro will get you a nasty bite in the butt. πŸ€“

            I expect #Slackware to release a new kernel soon to patch #DirtyFrag

            miss_rodent@girlcock.clubM 1 Reply Last reply
            0
            • paradegrotesque@mastodon.sdf.orgP paradegrotesque@mastodon.sdf.org

              Once again, like #CopyFail #DirtyFrag seems overhyped.

              Also: running the bleeding edge kernel and distro will get you a nasty bite in the butt. πŸ€“

              I expect #Slackware to release a new kernel soon to patch #DirtyFrag

              miss_rodent@girlcock.clubM This user is from outside of this forum
              miss_rodent@girlcock.clubM This user is from outside of this forum
              miss_rodent@girlcock.club
              wrote last edited by
              #6

              @ParadeGrotesque Noticed the same when I checked earlier, wasn't sure if the default 'huge' kernel was vulnerable, but, the (patched) generic kernel w/ my initrd was also fine (even ignoring the /usr/bin/su vs /bin/su difference)
              ... so, much like with copyfail, I'm left wondering why these modules are loaded by default on so many systems in the first place, since nothing seems to be breaking without them.

              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups