On Sat, Oct 22, 2016 at 4:04 AM, J. Roeleveld <jo...@antarean.org> wrote: > On Friday, October 21, 2016 11:04:19 AM Rich Freeman wrote: >> On Fri, Oct 21, 2016 at 10:49 AM, Mick <michaelkintz...@gmail.com> wrote: >> > https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails >> > >> > Are we patched? I'm running 4.4.21-gentoo >> >> Not yet: >> https://bugs.gentoo.org/show_bug.cgi?id=597624 >> >> You're probably going to want to update to 4.4.26. It has been >> released, though it doesn't look like it is packaged in Gentoo yet. >> I've been running upstream's git for a while (currently on 4.4.26). > > 4.4.26 is in the tree. You just need to unmask (~amd64/...) it. > Both as gentoo-sources and as vanilla-sources. >
It is marked stable now on amd64/x86. I imagine that all archs that the bug applies to will follow quickly. And upstream just released 4.4.27. I'd have to check the history but this feels like 4 kernel updates in about a week. -- Rich