If the modules ESP4, ESP6 and RXRPC are not currently loaded and if the one-line-special vulnerability blockage is introduced then it does require a reboot of the system to take effect.
NOT! test the vulnerability, it could cause exactly what it says.
And i said not run the One-line special ! and best approach is to boot on LTS for the time till the fixed main kernel is reaching repos.
You can use the fix they offer there if you want to.
It is basically making the modules non loadable and unloading them right away. But this is mentione under Mitigation:
If something tries to load one of the modules per example esp4 instead of doing so, it runs the /bin/false command instead of loading the driver/module
/bin/false: A command that immediately exits with a āfailureā status.
Result: The kernel thinks the module failed to load and stops. The driver is never initialized in memory.
blacklist prevents the module from loading automatically (e.g., during hardware detection), but it can still be loaded manually or by another module that needs it as a dependency.
like the exploit itself does.
The Arch forums have no mention about dirty-frag as on right now. Ditto for Cachy-OS. The Manjaro forum also has a pretty good initial post but not that much discussion on this.
The Debian news section has no mention of this. Nor is this being discussed on Debian Forums. Cant say about the Debian mailing list though.
All in all we are perhaps the most active community on this.