Another vulnerability that gives root access: dirty-frag (FIXED with Linux kernel 7.0.5 Update)

Done.

kinfo
Operating System: EndeavourOS 
KDE Plasma Version: 6.6.4
KDE Frameworks Version: 6.26.0
Qt Version: 6.11.0
Kernel Version: 7.0.5-arch1-1 (64-bit)
Graphics Platform: Wayland
Processors: 16 × AMD Ryzen 9 8945HS w/ Radeon 780M Graphics
Memory: 64 GiB of RAM (60.6 GiB usable)
Graphics Processor: AMD Radeon 780M Graphics

Updated. Although I was using the patched LTS before I rebooted.

Amazed at the timing of the community to find and fix errors. . . . hat’s off to all the dev’s.

Rich;)

Can I get the new kernel without a full ‘yay’ update ? I’m working with limited mobile data here :frowning:

Wow! That was fast! Shout-Out to the developers. :clap: :clap: :clap:

Arch and EndeavourOS do not support partial upgrading because doing so can cause real problems.

So doing

sudo pacman -Syu

is the recommended way, and may update less stuff than yay.

If you have not updated for 3 or 4 weeks or so you could have a problem, because there have been quite some updates the last couple of days alone, that are non AUR updates.

thanks team for you hard fast work on this. updated and back in the high life

If we install the mainline linux kernel arch-linux-7.0.5 then can we remove the dirtyfrag.conf file from /etc/modprobe.d/ directory? the file dirtyfrag.conf has the text

install esp4 /bin/false
install esp6 /bin/false
install rxrpc /bin/false

Hats off to the Arch team which fixed the Linux kernel so quickly. Were EOS devs also involved in that?

So linux 7.0.5 does not have the fix?

As far as I understand the situation three modules are affected by dirty-frag: esp4, esp6 and rxrpc.

Modules esp4 and esp6 have been fixed with kernel 7.0.5 (and 6.18.28) . Modul rxrpc has been fixed with 7.0.6 (and 6.18.29).

not realy understand also ,i use 6.18.28-1-lts and what should i do ,i update regular times…

thank you for advise…

You should update and reboot as soon as it becomes available.

thx and now also see this last reply ,dumb me :frowning:

mbod

15m

As far as I understand the situation three modules are affected by dirty-frag: esp4, esp6 and rxrpc.

Modules esp4 and esp6 have been fixed with kernel 7.0.5 (and 6.18.28) . Modul rxrpc has been fixed with 7.0.6 (and 6.18.29).

anyway thank you for the reply

rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.18.29

Go Pacman, go!

Done. Updated an hour ago

╰─❯  uname -r
6.18.29-1-lts