On 161021-11:04-0400, Rich Freeman wrote: > On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintz...@gmail.com> wrote: > > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails > > Not yet: > https://bugs.gentoo.org/show_bug.cgi?id=597624 >
We are talking grsecurity-patched (kind of stable[*]) kernel sources, the =sys-kernel/hardened-sources-4.4.8-r1 package [**]. I read most of the discussion, and I could easily patch the gup.c and mm.h in question, but those files need to be patched before application of the grsecurity patch, and that is a little more complex work. Has anybody done this, as I have limited time available to practice user patching (which in its simplest form, I was able to do here: >=dev-libs/nss-3.24 - Add USE flag to enable SSL key https://bugs.gentoo.org/show_bug.cgi?id=587116#c2 ), in case it can be done with user patching, of course. Anyone? Regards! --- [*] kind of stable, because there are, since about 1 yrs ago, only testing kernel available for the non-paying users ;-( [**] I have to use 4.4.8.r1 because recent kernel all crash with libirt and qemu which I am trying to use: https://bugs.gentoo.org/show_bug.cgi?id=597554 -- Miroslav Rovis Zagreb, Croatia http://www.CroatiaFidelis.hr
signature.asc
Description: Digital signature