Gentoo Archives: gentoo-user

From: Miroslav Rovis <miro.rovis@××××××××××××××.hr>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Dirty COW, 4.4.8-hardened-r1 how to fix?
Date: Tue, 25 Oct 2016 05:11:04
Message-Id: 20161025051154.GB9835@g0n.xdwgrp
1 On 161021-11:04-0400, Rich Freeman wrote:
2 > On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintzios@×××××.com> wrote:
3 > > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
4 >
5 > Not yet:
6 > https://bugs.gentoo.org/show_bug.cgi?id=597624
7 >
8
9 We are talking grsecurity-patched (kind of stable[*]) kernel sources,
10 the =sys-kernel/hardened-sources-4.4.8-r1 package [**].
11
12 I read most of the discussion, and I could easily patch the gup.c and
13 mm.h in question, but those files need to be patched before application
14 of the grsecurity patch, and that is a little more complex work.
15
16 Has anybody done this, as I have limited time available to practice user
17 patching (which in its simplest form, I was able to do here:
18 >=dev-libs/nss-3.24 - Add USE flag to enable SSL key
19 https://bugs.gentoo.org/show_bug.cgi?id=587116#c2 ), in case it can be
20 done with user patching, of course.
21
22 Anyone?
23
24 Regards!
25 ---
26 [*] kind of stable, because there are, since about 1 yrs ago, only
27 testing kernel available for the non-paying users ;-(
28
29 [**] I have to use 4.4.8.r1 because recent kernel all crash with libirt
30 and qemu which I am trying to use:
31 https://bugs.gentoo.org/show_bug.cgi?id=597554
32 --
33 Miroslav Rovis
34 Zagreb, Croatia
35 http://www.CroatiaFidelis.hr

Attachments

File name MIME type
signature.asc application/pgp-signature

Replies

Subject Author
Re: [gentoo-user] Dirty COW, 4.4.8-hardened-r1 how to fix? Fernando Rodriguez <cyklonite@×××××.com>