1 |
On Tue, Oct 25, 2016 at 07:11:54AM +0200, Miroslav Rovis wrote: |
2 |
> On 161021-11:04-0400, Rich Freeman wrote: |
3 |
> > On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintzios@×××××.com> wrote: |
4 |
> > > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails |
5 |
> > |
6 |
> > Not yet: |
7 |
> > https://bugs.gentoo.org/show_bug.cgi?id=597624 |
8 |
> > |
9 |
> |
10 |
> We are talking grsecurity-patched (kind of stable[*]) kernel sources, |
11 |
> the =sys-kernel/hardened-sources-4.4.8-r1 package [**]. |
12 |
> |
13 |
> I read most of the discussion, and I could easily patch the gup.c and |
14 |
> mm.h in question, but those files need to be patched before application |
15 |
> of the grsecurity patch, and that is a little more complex work. |
16 |
|
17 |
Did you tried it? |
18 |
The patch attached comes straight from the git repo, just run: |
19 |
|
20 |
# cd /usr/src/linux |
21 |
# patch -p1 < path/to/patch |
22 |
|
23 |
It'll likely work. |
24 |
|
25 |
> |
26 |
> Has anybody done this, as I have limited time available to practice user |
27 |
> patching (which in its simplest form, I was able to do here: |
28 |
> >=dev-libs/nss-3.24 - Add USE flag to enable SSL key |
29 |
> https://bugs.gentoo.org/show_bug.cgi?id=587116#c2 ), in case it can be |
30 |
> done with user patching, of course. |
31 |
> |
32 |
> Anyone? |
33 |
> |
34 |
> Regards! |
35 |
> --- |
36 |
> [*] kind of stable, because there are, since about 1 yrs ago, only |
37 |
> testing kernel available for the non-paying users ;-( |
38 |
> |
39 |
> [**] I have to use 4.4.8.r1 because recent kernel all crash with libirt |
40 |
> and qemu which I am trying to use: |
41 |
> https://bugs.gentoo.org/show_bug.cgi?id=597554 |
42 |
> -- |
43 |
> Miroslav Rovis |
44 |
> Zagreb, Croatia |
45 |
> http://www.CroatiaFidelis.hr |
46 |
|
47 |
|
48 |
|
49 |
-- |
50 |
Fernando Rodriguez |