Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Another day, another #Linux security vulnerability!

Another day, another #Linux security vulnerability!

Scheduled Pinned Locked Moved Uncategorized
nixoslinux
3 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • zekjur@mas.toZ This user is from outside of this forum
    zekjur@mas.toZ This user is from outside of this forum
    zekjur@mas.to
    wrote last edited by
    #1

    Another day, another #Linux security vulnerability!

    Dirty Frag: https://github.com/V4bel/dirtyfrag

    For my fellow #NixOS users, here is the mitigation I applied to my systems: https://github.com/stapelberg/nix/commit/05e40d77799a8d68dc019b316cb824904a53361c

    zekjur@mas.toZ 1 Reply Last reply
    1
    0
    • zekjur@mas.toZ zekjur@mas.to

      Another day, another #Linux security vulnerability!

      Dirty Frag: https://github.com/V4bel/dirtyfrag

      For my fellow #NixOS users, here is the mitigation I applied to my systems: https://github.com/stapelberg/nix/commit/05e40d77799a8d68dc019b316cb824904a53361c

      zekjur@mas.toZ This user is from outside of this forum
      zekjur@mas.toZ This user is from outside of this forum
      zekjur@mas.to
      wrote last edited by
      #2

      Now, the exploit did not work as-is on the NixOS 25.11 system I tested, so maybe the exploit code needs more adjustment (buys us more time) or does not work on NixOS for some reason.

      But better safe than sorry! So just mitigate proactively.

      jeroen@secluded.chJ 1 Reply Last reply
      0
      • zekjur@mas.toZ zekjur@mas.to

        Now, the exploit did not work as-is on the NixOS 25.11 system I tested, so maybe the exploit code needs more adjustment (buys us more time) or does not work on NixOS for some reason.

        But better safe than sorry! So just mitigate proactively.

        jeroen@secluded.chJ This user is from outside of this forum
        jeroen@secluded.chJ This user is from outside of this forum
        jeroen@secluded.ch
        wrote last edited by
        #3

        @zekjur I do the module block with the install rule; but I think the most elegant is what Debian sysadmin team does: https://salsa.debian.org/dsa-team/mirror/dsa-puppet/-/blob/production/modules/debian_org/templates/rc.local.erb?ref_type=heads

        /etc/rc.local (which runs at boot if systemd/init hooks it, do check that):
        sleep 60
        echo 1 > /proc/sys/kernel/modules_disabled

        Thus after the first minute of boot, disable any further module loading.
        Works on kernels and for modules that one does not use. Thus Debian is fine, RHEL is not for this class of bugs.

        (and one can 0 it if need to load a mod)

        1 Reply Last reply
        0
        • R relay@relay.mycrowd.ca shared this topic
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups