1 |
On Sat, Oct 22, 2016 at 4:04 AM, J. Roeleveld <joost@××××××××.org> wrote: |
2 |
> On Friday, October 21, 2016 11:04:19 AM Rich Freeman wrote: |
3 |
>> On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintzios@×××××.com> wrote: |
4 |
>> > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails |
5 |
>> > |
6 |
>> > Are we patched? I'm running 4.4.21-gentoo |
7 |
>> |
8 |
>> Not yet: |
9 |
>> https://bugs.gentoo.org/show_bug.cgi?id=597624 |
10 |
>> |
11 |
>> You're probably going to want to update to 4.4.26. It has been |
12 |
>> released, though it doesn't look like it is packaged in Gentoo yet. |
13 |
>> I've been running upstream's git for a while (currently on 4.4.26). |
14 |
> |
15 |
> 4.4.26 is in the tree. You just need to unmask (~amd64/...) it. |
16 |
> Both as gentoo-sources and as vanilla-sources. |
17 |
> |
18 |
|
19 |
It is marked stable now on amd64/x86. I imagine that all archs that |
20 |
the bug applies to will follow quickly. |
21 |
|
22 |
And upstream just released 4.4.27. I'd have to check the history but |
23 |
this feels like 4 kernel updates in about a week. |
24 |
|
25 |
-- |
26 |
Rich |