On Sat, Oct 22, 2016 at 4:04 AM, J. Roeleveld <jo...@antarean.org> wrote:
> On Friday, October 21, 2016 11:04:19 AM Rich Freeman wrote:
>> On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintz...@gmail.com> wrote:
>> > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
>> >
>> > Are we patched?  I'm running 4.4.21-gentoo
>>
>> Not yet:
>> https://bugs.gentoo.org/show_bug.cgi?id=597624
>>
>> You're probably going to want to update to 4.4.26.  It has been
>> released, though it doesn't look like it is packaged in Gentoo yet.
>> I've been running upstream's git for a while (currently on 4.4.26).
>
> 4.4.26 is in the tree. You just need to unmask (~amd64/...)  it.
> Both as gentoo-sources and as vanilla-sources.
>

It is marked stable now on amd64/x86.  I imagine that all archs that
the bug applies to will follow quickly.

And upstream just released 4.4.27.  I'd have to check the history but
this feels like 4 kernel updates in about a week.

-- 
Rich

Reply via email to