Public exploit without vendor’s CVEs. Looks like a broken embargo. Consider as dangerous. This is a kernel-side vulnerability, so to have it properly fixed you need to wait a new package from the vendor and reboot. There is a mitigation via modules removing, but it can brake your stuff that uses it (or hust not let you unload, keeping you vulnerable)
You must log in or # to comment.
@histrio@0xdd.org.ru it started happening too often #dirtyfrag
@histrio@0xdd.org.ru Some distros can have builtib esp4 modules. Mitigation will not work fir such cases. Check how your kernel was built
grep -E 'CONFIG\_INET\_ESP=|CONFIG\_INET6\_ESP=|CONFIG\_AF\_RXRPC=' /boot/config-$(uname -r)



