From: | "J. Roeleveld" <joost@××××××××.org> | ||
---|---|---|---|
To: | gentoo-user@l.g.o | ||
Subject: | Re: [gentoo-user] Dirty COW bug | ||
Date: | Sat, 22 Oct 2016 08:04:43 | ||
Message-Id: | 1726449.2yUzKl7bVN@eve | ||
In Reply to: | Re: [gentoo-user] Dirty COW bug by Rich Freeman |
1 | On Friday, October 21, 2016 11:04:19 AM Rich Freeman wrote: |
2 | > On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintzios@×××××.com> wrote: |
3 | > > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails |
4 | > > |
5 | > > Are we patched? I'm running 4.4.21-gentoo |
6 | > |
7 | > Not yet: |
8 | > https://bugs.gentoo.org/show_bug.cgi?id=597624 |
9 | > |
10 | > You're probably going to want to update to 4.4.26. It has been |
11 | > released, though it doesn't look like it is packaged in Gentoo yet. |
12 | > I've been running upstream's git for a while (currently on 4.4.26). |
13 | |
14 | 4.4.26 is in the tree. You just need to unmask (~amd64/...) it. |
15 | Both as gentoo-sources and as vanilla-sources. |
16 | |
17 | -- |
18 | Joost |
Subject | Author |
---|---|
Re: [gentoo-user] Dirty COW bug | Rich Freeman <rich0@g.o> |