Gentoo Archives: gentoo-user

From: Rich Freeman <rich0@g.o>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Dirty COW bug
Date: Sat, 22 Oct 2016 10:52:34
Message-Id: CAGfcS_nertJ2hj7MjpFoCg2re-1ptToUKa626wqETZ8O2bDdYA@mail.gmail.com
In Reply to: Re: [gentoo-user] Dirty COW bug by "J. Roeleveld"
1 On Sat, Oct 22, 2016 at 4:04 AM, J. Roeleveld <joost@××××××××.org> wrote:
2 > On Friday, October 21, 2016 11:04:19 AM Rich Freeman wrote:
3 >> On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintzios@×××××.com> wrote:
4 >> > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
5 >> >
6 >> > Are we patched? I'm running 4.4.21-gentoo
7 >>
8 >> Not yet:
9 >> https://bugs.gentoo.org/show_bug.cgi?id=597624
10 >>
11 >> You're probably going to want to update to 4.4.26. It has been
12 >> released, though it doesn't look like it is packaged in Gentoo yet.
13 >> I've been running upstream's git for a while (currently on 4.4.26).
14 >
15 > 4.4.26 is in the tree. You just need to unmask (~amd64/...) it.
16 > Both as gentoo-sources and as vanilla-sources.
17 >
18
19 It is marked stable now on amd64/x86. I imagine that all archs that
20 the bug applies to will follow quickly.
21
22 And upstream just released 4.4.27. I'd have to check the history but
23 this feels like 4 kernel updates in about a week.
24
25 --
26 Rich