
Ah shit, here we go again.
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Ah shit, here we go again.
I'm sure removing the root user will prevent all escalation exploits. Can't get root if there is no root!
/j
Make root login 2FA with yubikey or TOTP

😂😂😂
Same workaround works here as with dirty frag. Just disable those kernel modules.
Maybe the solution is to just, delete a bunch of kernel modules.
How many of them are actually important anyway?
Unless you deliberately set out to compile a minimalistic custom kernel, less than half of them. Problem is, you may not be able to easily tell which half.
Good news. One fewer zero-day.
what's a scenario where you could suffer from this vulnerability?
if somebody already has access to your machine, but doesn't have root privileges
If this is quickly solved, there is nothing to worry about
Sorry if my english is bad
It is already solved. The dirtyfrag patch fixes it already.
Only think you forgot was punctuation marks at the ends of your sentences.
This simply means the person isn't finished talking.
It's frustrating that there isn't much of an effort to turn Linux into more of a microkernel. Instead the kernel just keeps getting bigger with even more subsystems and modules that can be exploited.
A microkernel wouldn't be that useful without a stable module interface, which won't be coming anytime soon.
There is at least already a userspace PCIe API. And USB and so on.

Fuck it, taking my home server offline for a while.
Mainly because of the nginx RCE
apparmor ftw
At this point we might as well just run everything as root anyway
Leave ssh root access open with no password. Attackers will try to escalate privileges as their default strategy, when that fails they'll add your IP to their unhackable blacklist.

Scarry! Uoi guys on windows better stay away...ohhh privilege!
I think you might be able to deactivate this one by turning off XFRM support in a custom-configured kernel, at the cost of losing some types of tunneling. Not going to actually test that, though.