1 |
On 161021-11:04-0400, Rich Freeman wrote: |
2 |
> On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintzios@×××××.com> wrote: |
3 |
> > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails |
4 |
> |
5 |
> Not yet: |
6 |
> https://bugs.gentoo.org/show_bug.cgi?id=597624 |
7 |
> |
8 |
|
9 |
We are talking grsecurity-patched (kind of stable[*]) kernel sources, |
10 |
the =sys-kernel/hardened-sources-4.4.8-r1 package [**]. |
11 |
|
12 |
I read most of the discussion, and I could easily patch the gup.c and |
13 |
mm.h in question, but those files need to be patched before application |
14 |
of the grsecurity patch, and that is a little more complex work. |
15 |
|
16 |
Has anybody done this, as I have limited time available to practice user |
17 |
patching (which in its simplest form, I was able to do here: |
18 |
>=dev-libs/nss-3.24 - Add USE flag to enable SSL key |
19 |
https://bugs.gentoo.org/show_bug.cgi?id=587116#c2 ), in case it can be |
20 |
done with user patching, of course. |
21 |
|
22 |
Anyone? |
23 |
|
24 |
Regards! |
25 |
--- |
26 |
[*] kind of stable, because there are, since about 1 yrs ago, only |
27 |
testing kernel available for the non-paying users ;-( |
28 |
|
29 |
[**] I have to use 4.4.8.r1 because recent kernel all crash with libirt |
30 |
and qemu which I am trying to use: |
31 |
https://bugs.gentoo.org/show_bug.cgi?id=597554 |
32 |
-- |
33 |
Miroslav Rovis |
34 |
Zagreb, Croatia |
35 |
http://www.CroatiaFidelis.hr |