On 161021-11:04-0400, Rich Freeman wrote:
> On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintz...@gmail.com> wrote:
> > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
> 
> Not yet:
> https://bugs.gentoo.org/show_bug.cgi?id=597624
> 

We are talking grsecurity-patched (kind of stable[*]) kernel sources,
the =sys-kernel/hardened-sources-4.4.8-r1 package [**].

I read most of the discussion, and I could easily patch the gup.c and
mm.h in question, but those files need to be patched before application
of the grsecurity patch, and that is a little more complex work.

Has anybody done this, as I have limited time available to practice user
patching (which in its simplest form, I was able to do here:
>=dev-libs/nss-3.24 - Add USE flag to enable SSL key 
https://bugs.gentoo.org/show_bug.cgi?id=587116#c2 ), in case it can be
done with user patching, of course.

Anyone?

Regards!
---
[*] kind of stable, because there are, since about 1 yrs ago, only
testing kernel available for the non-paying users ;-(

[**] I have to use 4.4.8.r1 because recent kernel all crash with libirt
and qemu which I am trying to use:
https://bugs.gentoo.org/show_bug.cgi?id=597554
-- 
Miroslav Rovis
Zagreb, Croatia
http://www.CroatiaFidelis.hr

Attachment: signature.asc
Description: Digital signature

Reply via email to