this post was submitted on 07 May 2026
195 points (98.0% liked)

Linux

65394 readers
804 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 7 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] monovergent@lemmy.ml 86 points 1 week ago (1 children)

Can't wait for one that'll work on Android so I can maybe root some otherwise useless old phones

[–] rabber@lemmy.ca 12 points 1 week ago (6 children)

What would you use the old phones for out of curiosity?

[–] tabular@lemmy.world 17 points 1 week ago

A middle finger to those you're jailbreaking from.

[–] lengau@midwest.social 16 points 1 week ago

I'm not the person you replied to, but I would love to have more ARM hardware for running tests on. A lot of what I write needs to be separately tested on each architecture.

[–] nyan@sh.itjust.works 10 points 1 week ago

I've encountered a couple of people who use them as remote cameras to observe their 3D printers. That suggests a bunch of other possibilities for things you want to be able to watch or listen to without standing over them and without buying an extra webcam to cover what might be a temporary need.

[–] sp3ctr4l@lemmy.dbzer0.com 8 points 1 week ago* (last edited 1 week ago)

They are less expensive.

EDIT:

Sorry, I misread the parent comment.

You would use them for literally anything you typically or potentially could use a phone for.

If you are not playing video games on your phone... there is basically no common reason to have a top spec brand new phone.

What do I want my phone to do?

Make calls, send messages, run a web browser, check emails, take a picture or video every once in a while, act as a notepad, check a weather forecast, have some map explorer, use some entirely 2D proprietary apps for things like... groceries or hailing a ride or checking my bank balance.

Pretty sure that right there is about 80% of people's phone use case.

You do not need top spec hardware to do any of that.

You have the gaming thing to do the gaming stuff.

[–] monovergent@lemmy.ml 4 points 1 week ago

Removing all the system-level bloat that makes them unpleasant to use, perhaps stripping one down to the level of a fancy MP3 player with its microSD slot. Also having "disposable" phones to play with various rooted tweaks. All of my easily-rootable phones are too valuable as daily drivers to experiment on, while all of the ones I don't care about also don't have rooting methods yet.

load more comments (1 replies)
[–] Damage@feddit.it 45 points 1 week ago (2 children)

Ok this is the first time I try one of these exploits and it works on my system, I'm currently very spooked.

On the other hand, this may allow me to root my LG WebOS TV?

[–] belated_frog_pants@beehaw.org 4 points 1 week ago

Now that i Didn't consider

load more comments (1 replies)
[–] inari@piefed.zip 40 points 1 week ago (1 children)

Good to see these exploits being found and worked on

[–] Thaurin@lemmy.world 20 points 1 week ago (2 children)

This was leaked early. There is a mitigation (see link for confirmation):

sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"
load more comments (2 replies)
[–] shirro@aussie.zone 40 points 1 week ago (2 children)

In the 90s I compiled all my kernels at home from source with just the drivers I needed. Only installed the packages I needed. Only enabled the services I needed. The Unix way. When the kernel added modules I was still only compiling a subset and generally loading them manually.

Obviously that doesn't work for most users and distros sensibly started shipping with modules compiled for practically every need. Usually when I view distro security alerts they are for packages I don't install. But I have all these damn kernel modules just waiting to automatically load. I know I can blacklist them individually but I wonder if there is a way to profile the modules I use and use a deny all/whitelist approach instead?

[–] mlfh@lm.mlfh.org 26 points 1 week ago* (last edited 1 week ago) (1 children)

modprobed-db can create a profile of the kernel modules that get loaded by your system over time. You can feed that directly into make localmodconfig to build a kernel that only includes those modules, or use the data to build a modprobe whitelist.

[–] MonkderVierte@lemmy.zip 6 points 1 week ago* (last edited 1 week ago) (2 children)

Hm? Somehow, lemmy.zip messed up the proxying, (clickable link)? Good thing you've pasted it plaintext.

[–] mlfh@lm.mlfh.org 3 points 1 week ago

Hahaha no I'm just an idiot and accidentally swapped the url and text, thanks for catching that - fixed now

load more comments (1 replies)
[–] MNByChoice@midwest.social 3 points 1 week ago (1 children)

Clearly you know of lot about this. Here are some comments for the next human.

Deny all modules seems more possible than a whitelist approach. To deny all, the command is likely "sysctl kernel.modules_disabled=1".

Whitelisting is harder. One could store a list of all loaded modules on a working system. Store a list of all kernel modules currently installed on the system. Compare the lists and remove from the "all" list the "running" list (grep will do this) and write it to the blacklist file.

The problem with the Whitelisting approach is that it needs to run after every kernel module install (which is doable).

If the above is the case, then someone must have automated this already, but I cannot find it quickly. (I checked Debian's package repository.)

[–] shirro@aussie.zone 6 points 1 week ago

Clearly you know of lot about this.

Nah, that is the problem. It all got so dynamic and easy I don't really know how the hundreds of active modules on my desktop are loaded, why or in what order anymore. The days when I could list a handful of modules to load at boot are long gone I think unless its an embedded device or perhaps a simple server.

Setting modules_disabled might be viable for a relatively static system. I have seen that one when looking at hardening servers in the past but thought it was a bit extreme. Perhaps not.

[–] Mwa@thelemmy.club 23 points 1 week ago (1 children)

may become useful if i forgot my password.

[–] racoon@lemmy.ml 6 points 1 week ago

Or somebody else’s password

[–] Ooops@feddit.org 12 points 1 week ago* (last edited 1 week ago) (1 children)

Update: Kernel 7.0.5 just released

Fixes: cac2661c53f3 ("esp4: Avoid skb_cow_data whenever possible")

Fixes: 03e2a30f6a27 ("esp6: Avoid skb_cow_data whenever possible")

Fixes: 7da0dde68486 ("ip, udp: Support MSG_SPLICE_PAGES")

Fixes: 6d8192bd69bb ("ip6, udp6: Support MSG_SPLICE_PAGES")

load more comments (1 replies)
[–] mecen@lemmy.ca 8 points 1 week ago* (last edited 1 week ago)

It was patched in almalinux though, and it was how this exploit got exposed before disclosure.

At lest this is what I read

[–] jodanlime@midwest.social 7 points 1 week ago (3 children)

Well shit. I wonder if all Linux systems are affected, the testing in the repo doesn't cover Arch for instance. For now I'd assume the answer is yes.

[–] CodenameDarlen@lemmy.world 12 points 1 week ago* (last edited 1 week ago) (1 children)

Yea it works on arch, I just tested on my own PC:

OS: Arch Linux x86_64
Kernel: Linux 7.0.3-arch1-2
❯ ./exp
[root@arch dirtyfrag]# ls
README.md  assets  exp  exp.c
[root@arch dirtyfrag]# whoami
root

I updated it last week.

Edit: I just ran yay -Suy to update everything and still works.

[–] racoon@lemmy.ml 8 points 1 week ago* (last edited 1 week ago)

Have you tried updating your system with a less cheerful command? Like damn -Syu

[–] Remus86@lemmy.zip 9 points 1 week ago (1 children)

I also just verified it worked on my Arch install. But running the mitigation command and rebooting effectively blocked it, and I'm on the Arch LTS kernel. I think the disabled modules are related to IPSec, which most desktop users don't really need.

[–] CameronDev@programming.dev 3 points 1 week ago (1 children)

Did you have the modules loaded before running the exploit?

load more comments (1 replies)
[–] CameronDev@programming.dev 6 points 1 week ago* (last edited 1 week ago) (2 children)

Its a kernel exploit, so probably. But I just checked my arch installs,and I don't have any of the kernel modules loaded. ~~Loading requires root anyway, so I think this may be fairly limited in reality?~~

Edit: seems the modules get loaded automatically :(

[–] adarza@lemmy.ca 3 points 1 week ago* (last edited 1 week ago)

don't see 'em loaded here, either. trixie (dietpi) server, aurora (f44) desktop

load more comments (1 replies)
[–] Everyday0764@lemmy.zip 4 points 1 week ago

I tried on nixos and did not work, but maybe the paths needs adjustments

load more comments
view more: next ›