Public exploit without vendor’s CVEs. Looks like a broken embargo. Consider as dangerous. This is a kernel-side vulnerability, so to have it properly fixed you need to wait a new package from the vendor and reboot. There is a mitigation via modules removing, but it can brake your stuff that uses it (or hust not let you unload, keeping you vulnerable)



@histrio@0xdd.org.ru it started happening too often #dirtyfrag